Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
6c84eaffe1e5046f49609a1d13b52789_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6c84eaffe1e5046f49609a1d13b52789_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6c84eaffe1e5046f49609a1d13b52789_JaffaCakes118.html
-
Size
4KB
-
MD5
6c84eaffe1e5046f49609a1d13b52789
-
SHA1
a5fb23d52f66192f05897bb7d08ced8d04cfc14a
-
SHA256
6f3c97e7f369e62dd32aaf533b32b938f82779ce9b43803e39a307e4eb240c3d
-
SHA512
54a34f67f0130446092cd5b2452ce6fc3a10ca33854dc8ba853059bf8620f474d8ed79d2c432cb50a18de10cfadc3ba6abe1fca754e27cd029acd32d324c5493
-
SSDEEP
96:ziEoemV4MSEPBDvV0n47ej/hgOKiljoufR1QnyneQqxKbzCnUh6RKoWnr5:zipZV4GD8/h/KiZzQn/Qqx62n5KoGV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 240 msedge.exe 240 msedge.exe 4612 identity_helper.exe 4612 identity_helper.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe 240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 240 wrote to memory of 4072 240 msedge.exe 82 PID 240 wrote to memory of 4072 240 msedge.exe 82 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 2104 240 msedge.exe 83 PID 240 wrote to memory of 1508 240 msedge.exe 84 PID 240 wrote to memory of 1508 240 msedge.exe 84 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85 PID 240 wrote to memory of 4788 240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c84eaffe1e5046f49609a1d13b52789_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb263f46f8,0x7ffb263f4708,0x7ffb263f47182⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,3314462952866687252,10300618444989068755,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58957247627620099a0c9929e517d60ea
SHA1ecbd0ff3950df0e06aa6280ecbfc96e4d7a43f0b
SHA256a3bf1758e8f015ead13d6980e9b11fba610d1a21f1f8afacaf2ac5dce47a57e1
SHA5126744cd87ceece55855d33ed1398b36b1020ae05fdbdc91a712f6b59a2c134ed776dfd039602ffa39369f0fb40b5dff89f7eefe22cfdca4308b26ac22c93cc598
-
Filesize
821B
MD5bd53567187471bcfac890eb4d3359b11
SHA13cf0913e0ed467b3f8fe03c3da216bf31dca8edc
SHA25603407d4856866fdaeee4e03b2222c07414e66973d7e110f6ae101febedc2bc97
SHA51290e12ba03c416ddf1817896d9b6d2cd4e75ba82a0602903c2bdde888021f4d798cb3525f40458300a27a7e39f2afa1463aaf904df5a02f5d53d2eda4c033bc21
-
Filesize
5KB
MD54816d111e21bd91c902055d01bd76120
SHA13116666cb1feb8ec17563f4801a4631a937b98ac
SHA256c891974c8b1dc2677d2f7ae50d5ad581c1b6cd483274e4601ca78046ac4a2b19
SHA512eb7a29092cda87c36fb0535c750e90f76f315b66fc12a66544f6059acf585ee67f82f25457f551336d7dc4a4e05c21b7c814ea5fa90632d53031a2ba5b392fdc
-
Filesize
6KB
MD5e10bf2ba7f8194773fd3d70991543c7f
SHA14f3b22b37a168beb74d9ec1c722aae2a65255d21
SHA256df24afc634ecd0c4892232b127dd74afc9e72517c3a5fd0a193a4796cbef1d69
SHA512ecf518bc20651d949e1a6b72cb758b4c639099802459b06d6dc703a7d306ec5e91d07198530a9f81d6e9e0a70954354e2851c86fc36c25a7b8a79ba1b07d6863
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50afa5e3c4cde68f5464a9f3d06800886
SHA16a8bb48b25fc7cd2c1added0fe7df763b7c6cc3b
SHA256953874c8188c9721b6000f4aa96c34bb066a961b7067a8fac128c254c2ced8ad
SHA512ae5a14cfb9fc6daa215dda373380773a133e9d04c4f6ea180e337eaec173e56f842dbcbf8230291b7bab6cf259169663022027d344a958666d31f38c57effc6f