Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
72efcd3cd98c235fde6ac79807679484_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
72efcd3cd98c235fde6ac79807679484_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
72efcd3cd98c235fde6ac79807679484_JaffaCakes118.html
-
Size
175KB
-
MD5
72efcd3cd98c235fde6ac79807679484
-
SHA1
ac5ecf0120e5efb7283823af2e17ac30405ccd33
-
SHA256
3c454d7879c0e4ef16dcf5cde6b074d3621edea4b1daf50919864b17ec0989fa
-
SHA512
7727f5265f0d0aeef979d34553d06804ed6411fcdf9f72341c4a5cead1dff6c580f02dd0e7a2e9faa471e0425c0bce2ae9596b1c10f7c2f72e355eeae107e1cc
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3fGNkFjYfBCJiZG+aeTH+WK/Lf1/hpnVSV:S9CT3f/F6BCJiVB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2412 msedge.exe 2412 msedge.exe 996 msedge.exe 996 msedge.exe 3276 identity_helper.exe 3276 identity_helper.exe 5672 msedge.exe 5672 msedge.exe 5672 msedge.exe 5672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 4444 996 msedge.exe 83 PID 996 wrote to memory of 4444 996 msedge.exe 83 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 3484 996 msedge.exe 84 PID 996 wrote to memory of 2412 996 msedge.exe 85 PID 996 wrote to memory of 2412 996 msedge.exe 85 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86 PID 996 wrote to memory of 4084 996 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72efcd3cd98c235fde6ac79807679484_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaeba946f8,0x7ffaeba94708,0x7ffaeba947182⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13534461100642568113,12958408964547945421,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD52fa233701f00565040a053e85b191046
SHA155a066751093465d10505eab2d522fdbd30377b0
SHA25689eb53a26a2a4c2b212e17dcaea1acd89b6ee3604d80eb4066462a9c7a309ec8
SHA5123cee2fdedf05c6bd772ab85280a5e8a18ab619ca87e4069f2990310ff701c2b753d7ffe5cce024f340d9ac612448fe23a7d967359e12fa1746c1e07041155558
-
Filesize
2KB
MD5de091091af5a026dd777231aa9814790
SHA11a8c61b7da0504a0dfda060d6ab3974ab2c60d91
SHA2567fce4b0620027347a23c2a2cf60a96b91c9a88adc115ba4bf041cb793bbdd6fe
SHA512afbbb123e028f25ee1b3ff75b6f7501e6b2071c5b5524156505af4f9771011cb4d3374eb2715fd7e69e3dd4092764c683997355af49cbd8dbdfe7ffb42bf8392
-
Filesize
2KB
MD512ed670367f4879ed1ac966ef6b73b84
SHA10a69e10527ac42231e08e3d8d5fa498dc6e66c4b
SHA25686fe321f762f7b6f6f631912c0454ab4e9ffb2c358b0d76bf280384b124f518c
SHA512ed4097bdc9d379fbecf7e32c56a073fdd6e887ba45486f5fcbaff09198eec5a1a02446f40f2c00c70454141e76a29d8c8ada602089bc775d5400c60a1b218cfe
-
Filesize
5KB
MD51efb21cddd20a4e3021f4e8cc9e272a2
SHA177e3ccf0164c2a5d5372a2a7fccc6763bf60e235
SHA25618b30d0373f4d94fefd490690ee975655e9d48edcfbf67a05029dc25b82b3fe1
SHA512a5ff4820f8b39b0078dfccd1417aa0c1478d9e6d48c3633e315bb8bf63a6546727416c65c4ec573177e78628354de673b5b4669a2edf086573a4f3f7df992f23
-
Filesize
7KB
MD52d8281613a5dec8ca0c46941a6cca217
SHA11e53050a21b5910c042a8a77713dcc63d9f62722
SHA2564a790a595d721b6e2f5b5461927ee1c23701190f7d7d94fe0b22bad5103b6216
SHA512fb6602b8749fb8da9ae90824b7a17b9facf0fe2b08c18bd661a8e1ab4e70965860c8b5a2df05eba1f3a609422eca4568b6cb8ea3fdbeafd8914bad30f2301aff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e577e878552e589c3074240630fc347a
SHA1d2b27ae8780e373ae5fd81d80e3c9245d2e4c7c6
SHA25626dacc52daea12618a246869d13f9a280dc89c4829e525e499c1dbdb56205984
SHA51294cb3775b5c884c908a8aff7941ca49806be3c5576c19fbb8db6ed18934948032d4dff29a732f26232171a665ffb41a0e92d27c230e3b4df4ef5587eb880cb59