Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
63d0a92e7633ba34663dc8c48b3c2243_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
63d0a92e7633ba34663dc8c48b3c2243_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63d0a92e7633ba34663dc8c48b3c2243_JaffaCakes118.html
-
Size
73KB
-
MD5
63d0a92e7633ba34663dc8c48b3c2243
-
SHA1
2ad739fef91dd03ac228458830fe23503a0422a2
-
SHA256
41a76530701b02cba420d412eb0ebe88a139a51df460c6801c248cea85bba434
-
SHA512
d0c643e926ec129cd0947f0502282260f9c98cd83223c38f8f165c8ce421d4cd16351b056ccdcf3ad6b9e517813ec399337881cbaf392856bcf54a8af9445945
-
SSDEEP
1536:LaPKWn7ShymwPykJxmDyb60+PFyeQ9Z96o9k989hFtbw979B4NWqgtVegWwCKYFK:GPKW7K4NWqgtVjWwCKYFhmF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 848 msedge.exe 848 msedge.exe 2684 identity_helper.exe 2684 identity_helper.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 848 wrote to memory of 2660 848 msedge.exe 82 PID 848 wrote to memory of 2660 848 msedge.exe 82 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 4936 848 msedge.exe 83 PID 848 wrote to memory of 2652 848 msedge.exe 84 PID 848 wrote to memory of 2652 848 msedge.exe 84 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85 PID 848 wrote to memory of 1832 848 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63d0a92e7633ba34663dc8c48b3c2243_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7c1346f8,0x7ffa7c134708,0x7ffa7c1347182⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1916 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1464 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,1933456800413444246,9298080769012194638,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5195ad369327e5274e6847de69447e82e
SHA16e35550d5b79c92ef8380102b064fc7eec57d9f1
SHA256c8e9d0dca2a8bacce99e6ce957583a44d34b0c4ad70fe798721d83c7cd6cd13c
SHA5125ccf69d1ce7eedcea53af38a0d78324d9547e747cac91a8a936edb312eff9c25c5a9b6bb3781d5e83d7480beabc58bb841530fb0136b23b0971be3380b5b5b1f
-
Filesize
601B
MD5d8ddea44dcc5d66d776c1f07ec146b12
SHA109bd7fb48162f41191f0e4dca3c6e1ca69df0c81
SHA256d8b051992023b9564b862c93c6aa489ab19b010932ec27b7d1b5944223951181
SHA5124890cb240172047bbdd8649a3525c22c8d1a0aa084f7c8a8daa9a08d7b6b2fbd4274011dd948255f99283cfff3226cb2730703c2034af737c6569962c35d91c0
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD52a5e4c9f7a9c89403ead46956eb96954
SHA1f46747f69766fdd1f530a020a47581318f00be63
SHA2566acf67aeddb873419f557b51279275551c8c3d867c493c0266173b0e9300df5e
SHA51225e95783370757c337d79518990f05515564783998979b8efa4ddd3b71b40e2301ab120fa1f00d6ed83c3fcd115d013ed3ec787169503d0b4cfff743de87ea1b
-
Filesize
5KB
MD514ecb2cf419c269cf0a8247f65eaad0f
SHA16e610c050a836aa6568cf37ceb32795aa755e803
SHA2561dc44215396be4b0e46abd1faa03041c45a41aefb38f8095ed7de254657478ca
SHA51262eff0f5ca7c0d99785799ffde9be9b4d6bf2954a96b1261b10d04696839e31a861b16249f3cc9d37bb8666ee9e611e57b38017930d224167c1335b663333e5c
-
Filesize
6KB
MD5bde29c7482c5db98e7f97d400d5f9a4f
SHA1b8a1dda2eef52f81223a0bcf5160867489595fdb
SHA2565d7bff108de279dc4422c7aa2f6d3e915a30b8acac35975c5cb5463b1bbf1b99
SHA512ccc01f0901d381f9b34be9545011f68a94780758a50aa074c2a0b99155e8c2dc90a59cb65aa3699088eee2a66db707e638bff50e254a46bd4dbfba186ef7f99e
-
Filesize
537B
MD5e870fb0dc4c22b0feff01b17522b00d1
SHA176c998e70c85a53a3cf6f672512bc85e01444889
SHA256bde50c316a93ad15b201f21a59321acce4846c3394593bd0b5bf3807ac8aa2c9
SHA5129e1d09e404631f2054007182ec63e440cf8159060f9a1964663718344156492cca009efb105628004d0455e03af2148442241dbca82e7270a5a2fd2e4a54ddc1
-
Filesize
203B
MD52838323247898d224aa9dc9cf8be076c
SHA1fa4a53ee529b4c44c62fedc2ae5240efb3846cfd
SHA25664c611f688264a5192b833285291a16d659bd388693d512de13b6aee5496d700
SHA512b334d08cefe72a2ccce75c922437d2f54135035c9afbf9b05447b7c5573257652dd9da64733df32822909b5f5ac561963b52e9f633fd34890c38bf02d768294c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD53da176664e7b28f7e0e56b345dfe7130
SHA1f4112b5ac44c0b7e96e3b48eef559ea6fcb11cd9
SHA256bcc7b48c71934d2c0078a715a37a561bc8bbcc382ecbb8b1cfaa2274fae5b0d7
SHA512f9903a8ddae99b95cc71d0a5c2b6227e5338206d6b05ebf1a8599f8a588118946d6417211d4be7d0b9cb3a609d49e6dff49874dfc1a68c1e23207c2baa8f3ec7