Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 21:53
Static task
static1
Behavioral task
behavioral1
Sample
6fe94b0f8ea433a888ffe5ee5cd852ab_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6fe94b0f8ea433a888ffe5ee5cd852ab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6fe94b0f8ea433a888ffe5ee5cd852ab_JaffaCakes118.html
-
Size
23KB
-
MD5
6fe94b0f8ea433a888ffe5ee5cd852ab
-
SHA1
0d13a7ebe2b86017c1771efeb468c348ef8e0933
-
SHA256
f57eee39570f32b06db62f1dae96ae36de04a1d59523f969b9c9c61da1e62ed3
-
SHA512
274c507b88829e1e573afb739e89ae1c2c212acd0c1377a0ba41ac02230ddd7e20a471445950ac132570455461be41709ffb8c07e54245684de2e5262e32fd46
-
SSDEEP
384:LOjrneSWG75g8yBn61VPNIMmoWeUi+kiqpembdkeN7t1OINhytjPF3sJj3KLUe/e:LOjLeSR5gBnMEeUi+LqpembSeN/OINe0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4232 msedge.exe 4232 msedge.exe 4940 msedge.exe 4940 msedge.exe 4264 identity_helper.exe 4264 identity_helper.exe 5292 msedge.exe 5292 msedge.exe 5292 msedge.exe 5292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 2392 4940 msedge.exe 82 PID 4940 wrote to memory of 2392 4940 msedge.exe 82 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 1572 4940 msedge.exe 83 PID 4940 wrote to memory of 4232 4940 msedge.exe 84 PID 4940 wrote to memory of 4232 4940 msedge.exe 84 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85 PID 4940 wrote to memory of 2180 4940 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6fe94b0f8ea433a888ffe5ee5cd852ab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0aba46f8,0x7fff0aba4708,0x7fff0aba47182⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3260 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6785795470080675168,3565120682977642909,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2c8 0x4541⤵PID:1680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD58e41ab8d7ebd4dd51de8e68671327a3c
SHA16394ead567070e524cb37a55359299a4bf68a630
SHA256cfab1cab6955d7b36c8ed5190a078e81aad7c78f1018d52d2d781be0429215e5
SHA512198884f6337ee77b12530bba9f2cadede4acb3167fba603b5dcffaf78b0026606559d9e086b8b393718aa009199d14bd2bff30b0a8b63a4e5d160a7bcf97419f
-
Filesize
3KB
MD52a898b98cf86e78ef99f1364b73196e2
SHA1bc10349394da94eb6dffffe22d1062276f2a606e
SHA25623feebd2999c18c866360d0ddcbb19a7de3106817565a3455a573a85d1a7b9a4
SHA512dda4942b4af2c8898877f1ece365380c5ab3efbae033aa01bd878af841d1bf2809487746cc53ac81fc4de4b5c2ceae4e3e869ba0a6a88b5f98feb8e1e15e8915
-
Filesize
3KB
MD5f26264fa62b3e4ac3f62c0af639c1956
SHA1b74d9fb809341b02ae0cc2724c485d93d45ed9ea
SHA2564fd658577c0a011352421350bb4c5a0429c81439dcaa28efec5ba1c8f03c5518
SHA5120b921c8e913923e68406429a126d1d8e62700f3aab05b0161bfd48bad0f5b6e27c19f14908c0df531729f68ef03e4e55317705cb4fbfa7575e7b2e8f4a3755c2
-
Filesize
5KB
MD5e10a10c769b9112300588628d3d21e82
SHA1025846e935f882a86debc4d90d4d8f386f8c1fb1
SHA256050af6f8edb5a5380106f3273970ff3be4ee91cb335bcd788d9b3de330fcd7e4
SHA512219431d22bc508bdb610cc1f4461ad4eaf8cc2d0d1df82f5bca2c03e4991699be79017a5ce32cf1381c9bf9d60e7c13fe261c29634d8fe6001c72c58a1c2af46
-
Filesize
6KB
MD56ead747279e349ed32885c3a3a2d44ad
SHA1297488ed0c5dd68b1ea8272beb3b05be39d103a3
SHA25608566c42a9d1fcac776ba0714de965cae1f0a426452ab88704e03eda5cbf3711
SHA512cfcd3b147d44bbc0ea26b9d3d97fe6513a55a9b73021e4e9351d193fd9529768f845558d2fc12628462b77887397b7c792194ed85e412f7b13bd1e31d825ab9d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52f6701aec223ed6ff839dfecd76f05cd
SHA11b492138b76bd9105bfd55935516c91f839f14ab
SHA256afc7ecfffd0bdf9c521ba29c67ee968446e308270a2e24e0b0109489ac82d896
SHA5128538d9e3b232828aecdce6e00733fefb490f3154139bf2cb79b1a158ae1a91ac4a60d3bbe6a9f94ae4ff9c2ab964f7e69402e44a9fc9dbb3586282c89f1b870b