Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
63b6d2d7cd6ecd9119815a2177113a31_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63b6d2d7cd6ecd9119815a2177113a31_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63b6d2d7cd6ecd9119815a2177113a31_JaffaCakes118.html
-
Size
35KB
-
MD5
63b6d2d7cd6ecd9119815a2177113a31
-
SHA1
638e8a61127aef57a7f70e524832a512ab497f05
-
SHA256
d1e7c4bdac89a06c2586979c4acb4aab36c2dfbb28bed772b31d16493eee7957
-
SHA512
8cab5566e323e4ce4a83d877f3bee65114154815f5da9818f15201e218b96219d771a53f7ef1a2cb85c0785e3d48ee2d8145dd2463af6913246c9c038d22e7ca
-
SSDEEP
768:STAeIo1CX8C0H4SJdnwsFlIbqB2xQZAUry/Ev5IEtyxLTVUzuVVvQXb53AvtdA:STAeIo1CX8C0H4SJdnwsFlIbqB2xQZAq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3612 msedge.exe 3612 msedge.exe 1984 msedge.exe 1984 msedge.exe 2608 identity_helper.exe 2608 identity_helper.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3672 1984 msedge.exe 82 PID 1984 wrote to memory of 3672 1984 msedge.exe 82 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 2900 1984 msedge.exe 83 PID 1984 wrote to memory of 3612 1984 msedge.exe 84 PID 1984 wrote to memory of 3612 1984 msedge.exe 84 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85 PID 1984 wrote to memory of 216 1984 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63b6d2d7cd6ecd9119815a2177113a31_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff942d846f8,0x7ff942d84708,0x7ff942d847182⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:22⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5964 /prefetch:82⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,7144985368798228122,8253965801411591205,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5ee3eeaffc03062a309245481ffdcfe5b
SHA1740140413531c2eaf68dc514412f53c6f13bc97c
SHA25662c50d3766b0e30160e61f48f2b0424dfae5f2bfa215464d77a4fb70390ac62f
SHA512b674d1161bb6a3fed2ff9926b1f225ae71994668dd4bd760d554a654c81b02395f4b9f87f9034984819ba577837ac606350ec7cf8166df2fa8fb860683001f7d
-
Filesize
1KB
MD502f0f3fdcf984f6922ae7b12308adb65
SHA149806e8893ddfdb83e6f7f870178387b8d8c2d87
SHA2569d334e818e4075cf1f240cb91dce3d12a048b0071f67a63d72abfb1a77e5042f
SHA512da9cd2a8e38246d81dee1b599d3d8c3718bd8df4837c6e9500eaa9d7713414c7f3ceb77fd9af667d21d3b0028784eab24e9a3ea39359ddc376929c573beee210
-
Filesize
5KB
MD56a0d7af48c7fd3a2edd35ebc684a9444
SHA1f04e527edb76ffc2391f9cbcda66454564a4f45c
SHA2562d070655f4d8de0089b81dcef4f9a0303ede58413bf702681a9f7d0fa6672ce1
SHA5126472e65728bfee11aa5648ee5de2514460eed867e45d2505a88f8e5efd55f7519d91195cd933144df57d58299d9b01a80c33cabab6a380689bd0afeb93bb9515
-
Filesize
6KB
MD5cac461ff36a63787a74a060afa2df354
SHA16158a57acb70e95777b90857611365d12222e094
SHA256867016574b3b7556ad08feb4ecabd97271c30262df08b3ee8507c8d12fa3940c
SHA512ff91ef641e36df587ab8a0118e3f6003830efddae2b56b6bd373aa7b176a4ad96e0189d53cf0452231b0301cd9df70c5a74c9bceba622ccaea74d11dc5665224
-
Filesize
6KB
MD562635083022b69b760b01e5e338a287c
SHA1908947f70af0943b4b6ea5dc38c3babd45e1569c
SHA256da48f2f293c2a005fa91d4a33e61b37aa438097a000106d2e2425279a1931809
SHA51260814f6b5377332a5786dda403d2fd160bc4b54a9aca8ce60bd57a35b288eab06d8bef155b536fa694a3ac7be202082f8659f9dc859f3c4a24c249b16a579a58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50f8ce17da0cfdada8f731fe0675ac885
SHA158319781b3da9085013376b1aef9665bf360c100
SHA2563c8432eef5e5a12bd46b719b6d0f187381befcc0998d32e47de611a3661ea20f
SHA51240eb81beb8c6ce786ca5bda512d6831370f9d0f9b2fa8a08c6e37dd84d23ce2edf53d6199a1cf7e580c2d2087f8c083cbd33cc2f5b641e3bcaef06ddb45fcc4c