Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
5efc0429781a9e3614cfa4e848fae730_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5efc0429781a9e3614cfa4e848fae730_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5efc0429781a9e3614cfa4e848fae730_JaffaCakes118.html
-
Size
32KB
-
MD5
5efc0429781a9e3614cfa4e848fae730
-
SHA1
18b2001564924ff643f5b1caf7d27867354ad905
-
SHA256
6298918749b18ffedd06b16514c089e3a9a3325791c7efec4d4826863762d89f
-
SHA512
61e0e69124ac508c66aa664677a49252684cbeaa5027158a5f5f898ccaca58ed76e4ae08fa17e0946bf1fd78504571bed786973fdc904650a6e48453f35e035a
-
SSDEEP
384:VSIddZ20f6jIBAqoLsE2KK65Pj1xLfxRxhxNxIx+xbxnUAxEEIN+xMP5h+DfiJrK:VSqZ4jIjav5PjvhYDhh+DfiJrEx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 4364 msedge.exe 4364 msedge.exe 1152 identity_helper.exe 1152 identity_helper.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 940 4364 msedge.exe 82 PID 4364 wrote to memory of 940 4364 msedge.exe 82 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 2432 4364 msedge.exe 83 PID 4364 wrote to memory of 1644 4364 msedge.exe 84 PID 4364 wrote to memory of 1644 4364 msedge.exe 84 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85 PID 4364 wrote to memory of 976 4364 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5efc0429781a9e3614cfa4e848fae730_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1ff746f8,0x7ffe1ff74708,0x7ffe1ff747182⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2980 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,235388896156994469,914558187311327831,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\495b3abb-5523-479c-b23c-0591177ce7cc.tmp
Filesize2KB
MD527d44acd4d7ebcceb21a1f9aeb212b43
SHA13e16f1a2cbdeecdf22cf844bb34048443babb615
SHA25633ee976ecbecde690e40f92047e33a9659819360ea796e9cc38c9c9612c62479
SHA5127db974d8b6f69258542d76a585fd1a5b65611b7156dfe25e35f20d87a53cbe397597529cad297bcae8074ad6229a1d250964d24f08605b013da68a18e473cd14
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD59ad1f5cbe7aa134566e474d1310c6e2f
SHA14e8b9a72718ca0ffd7897bad2a04bdd810554abc
SHA256c297c524c0f3d6c58cfac5ea7f42ff353da893e1e2984c9f3e90c09df6712c18
SHA512df4e566161e2053e71057db1991b02ba46ea1560b5d857e1a6e9997cf388b22952ffa1e309b76afb63d43f2b636461c65f09143c605ef909b7f97d390c7e22f2
-
Filesize
1KB
MD532fbe4f3b647cca2079b6e9da913679e
SHA1fb7903c52aadb989be3fc9af509fcb333babbd8b
SHA256215d4d42dfad8d59f2e99cfd806c18b60f4f9bf9896d186bf6828e10e66fff39
SHA512b8834a099f955c4c7db6b40ac4ce3f1be695f6cb9b32d123f9c3e2243d28730a69ff9948b64fd82105b15d1134d5574ec79b6c9c96e7e1c688aaa9d4f2f1ff31
-
Filesize
5KB
MD56a635490045e098dfcffcb917493c3e7
SHA1830014aaf8e09e09db04d398e21e1d31481e8777
SHA256f4d10f194a04905eb5b92cddd62d054def50d31fcfc09b2d482cf931eef6d170
SHA5123b6771efa1f6de97a53fe7df851f9562f9249ed4493ce8e3cfb9e112a0dfe522ed0e80e3a63cd561f5fb9a89c5d6a5e1a494de87345e0bd32f8397831ae1a205
-
Filesize
6KB
MD5e755a023e7c31ed76ca928478d756cb9
SHA1464591cb5baeaa444a1907956af993af0b8d8ea1
SHA256c43c663d40d41115f524261a54e13d54c7e90bc45707abbc687de648cae1c4d8
SHA51200ca974ef9f8d0ba42e619013f853b5b6bd52a2b5682709e59f4ae4ec7c8a488b2475cc094fc8145de91a03b0231a13ce790efcd36a108a0cedd162fe7fad110
-
Filesize
6KB
MD502cc60fa5db5636a324d6f2e00f8faae
SHA1f55d7ce5e9a25d7a8de880b68c63b618274ded09
SHA256a45b11c91cbfa897f382dbf02bc96a3c7de1f0f7158a748a0c43f2602646f662
SHA5129e51999053d178f7bd7a43e9b21e9985a6c1b6fa8459a001a493c8f2d3581a3e54ebaca0fbf56f554a07af2c59cf899ef3984f5ab95bc572dbb21e50d82f5524
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a5a9f6f981b9a6853bb919f6786c406d
SHA1292dcf92e0495426defa7541dc69f162a27cd167
SHA2568c7f1f43646f622c152d39df06100a8c36e45015298368383c0931a6071a121b
SHA512b9aa81aba4bf7f125b651cf224bb368423c3b3d3912d5659c4958221b1430acc0ea8c9aef84247ceffcd2a310332aeab04bf17ac4455db8e6fad2cfa17ba88da