Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
6c4d8dcc2ede742efad5456d567b65fa_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6c4d8dcc2ede742efad5456d567b65fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6c4d8dcc2ede742efad5456d567b65fa_JaffaCakes118.html
-
Size
87KB
-
MD5
6c4d8dcc2ede742efad5456d567b65fa
-
SHA1
d31d61f7b5054c3202a96397ea8fd426d07cdd68
-
SHA256
862cf070777fbe01d48607a43530a62a1ffafa8c47b6eca18b61741c099ec32f
-
SHA512
5a8225db854fac221d6d3a6e4f3e5108535e7cde0847d9d07f7dd4f6993c7d9e4e687af723fcc72b144d2615ee405d448779f40c4afe9ffa967cc9ab9caf78ce
-
SSDEEP
1536:Ui/J7Cwt/Y3YUTn60mZDMbgqEO6cTGoYhAn4cPb:UkJpFOYUTnsZAbgqEjcTGoYW/Pb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4736 msedge.exe 4736 msedge.exe 2492 identity_helper.exe 2492 identity_helper.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe 4676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe 4736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3776 4736 msedge.exe 85 PID 4736 wrote to memory of 3776 4736 msedge.exe 85 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 1320 4736 msedge.exe 88 PID 4736 wrote to memory of 4228 4736 msedge.exe 89 PID 4736 wrote to memory of 4228 4736 msedge.exe 89 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90 PID 4736 wrote to memory of 2980 4736 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6c4d8dcc2ede742efad5456d567b65fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc5b1c46f8,0x7ffc5b1c4708,0x7ffc5b1c47182⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1848 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,4622769073032886498,4494420533553384384,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\74b4d397-e4b1-44a6-bff0-4cbfe88df178.tmp
Filesize6KB
MD590b0f9544b33accc8803d4f63e1fef2e
SHA1f0109883a661ac589c60ac15235302ec8e53bd75
SHA256bb2e1f3de2c0f2b5ad525d44fdeaa8fafa693d22f9caa7f0aa547f8e66466024
SHA51295ab4a96ae016b2426c29b11d04d1b5ea9ce0871096be9a5a47a29be3ca5c84b14821fefd7725802ef8dbca917c36670972b63ef7cbdda41ab2ee8d78cecd021
-
Filesize
588B
MD5c9c0b8c899d96160efe0da9e65d32fde
SHA170ee30a19ebf1eb0d22b2e72113ec859ea73cfec
SHA2568c892f285b727da305512775f38251e86a2b4adda4b34eec9a35274141d374e9
SHA512893cffa74134b584255e8b344da5fc9b2cadf526ab1e3b8c9911debe4f10af05fd18408516c9339053f25c077c61c121c05c2359c061489eb62956ba4c502a75
-
Filesize
6KB
MD5b24c524e56edb3c57153d77b620feb80
SHA1c4ef528eabd06eab4769b861e18af27ccf8226d5
SHA256c871a57ff5ed143a806deeab9d03e89b2886fe3c5ac3f388d7e9801458d496d0
SHA512c698cba1feb7d48b618f5c045bc5bf1cd39ef78b8943df6314f894aafe37eede05907c214e2f267212f01ae4d9e6e78ba9d3d269998c7098b5f6cf77f5478a74
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59e9c3f1b551f6267278977ebd9fdc61e
SHA12e46dac8bf96b4de3fc24c7033f6ec64e07623af
SHA25629ee9d741b209c309415cec9dad82ae2fd882fca0aca1ca186b62ffed8e7f846
SHA512b312c7a967180322b95d5ed828c669e1e943270811011fef97157cb54b9071668031a660472ceba989cb723ad8d0a3a8aea4a427110f8f9d354ffe1fe926ddfe