Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
76dd2289459a3e4b586b21c1af5cbb05_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
76dd2289459a3e4b586b21c1af5cbb05_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
76dd2289459a3e4b586b21c1af5cbb05_JaffaCakes118.html
-
Size
82KB
-
MD5
76dd2289459a3e4b586b21c1af5cbb05
-
SHA1
762dfcdf9795bfb3e5366ba611d812a3bceea425
-
SHA256
680fab73fb1c13f4465c1eb83ba0c7ea6c137d509b06f8b56a2bfa5c78e78123
-
SHA512
e0790edc0681a308167352b4aa99e70d04fdc5f63848295d086bad9ef4a0051ff474746ee868c5abb3d5bf3e4d160f1c92c0aee463470f2771a1545a24250af3
-
SSDEEP
768:K5Z6TUNo4YmxiHHnQlrHm2iBlmHynsX42GqeI7Q/QrTkZDTTtx0bBdlIzC7+:Y6QNymYkrHm96Hyns/8ntCmh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 4800 msedge.exe 4800 msedge.exe 740 identity_helper.exe 740 identity_helper.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1204 4800 msedge.exe 83 PID 4800 wrote to memory of 1204 4800 msedge.exe 83 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 4040 4800 msedge.exe 84 PID 4800 wrote to memory of 2592 4800 msedge.exe 85 PID 4800 wrote to memory of 2592 4800 msedge.exe 85 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86 PID 4800 wrote to memory of 3528 4800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\76dd2289459a3e4b586b21c1af5cbb05_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6508 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16401614954927465169,9893500144423850872,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\54a282a4-baf1-4149-a08d-4c7e8ba91a5b.tmp
Filesize6KB
MD5c7ad30ca8a9ec0e7390ef3f52a2fa561
SHA191f132a079916d76f199a20301d1a46f769a7662
SHA25658bccc7468414af1a27504a36639f5f4629b50fcf98795728d397663552c3f00
SHA5124c3e11045ef63366e44d227c040f4265725ca2058698e1a254fa099a41f883ca0a2ed329f32c6d2f806652828e79f2d87bdf14a996dc66a50ba35d42ab8234b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD502b2231244e739ea1f35adb477d08a61
SHA1cc4fbe24f5ee1ed058f9d67a6cb52f39d5d068df
SHA2560a7e742690c542dfe07b4680f97ba355b812883fe222a43cc26a82e27e271a87
SHA5122b884a1b4cd6c2818c951b1917cba7bab91db911ee569f7b24b3fcc419bdb362583c42994de258174eedbdcb45372baea6ad881aa2835b35a2fc30da5eb116e9
-
Filesize
1KB
MD5643183ee31546249027f5a91955bd250
SHA1759f89066633394d9447fd57f42b5c3a49fa2c1a
SHA2569cffde51bfe8f82016d4874b1aad6e1cb496784daf1d6dc842bdb1dc907e13e9
SHA5127f2ba4056d2a3433db0ac37a917a8bc2a2d784055196ac99aae3fc11bfce5b3ed1eca9f9c38171891be1096a5832a7679de63724728136c527a7ecdd024a1235
-
Filesize
5KB
MD58ce6e5c880aeca504d11549bd55f1317
SHA1558495d51d7933e8b08d4135b36f50e08789e408
SHA2564a3166344a2d2083766d01c7c03404562109b2c31c569d3d1244e1fa616e0008
SHA51213aa2100ff4a817b608c2ed7af8fa4eec92a8e2ff43d5a2e7bc8d0de3a83faa624520bd8323513660fd86bc73fc0490cdfc4ac9909dd9c08462d41ba71969779
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d27d71a3f4b86d79e1ca75ada46f4434
SHA1f4faa7d31ff2e3f0bd1363344c6cae08da6c4e17
SHA25619276ad046d458f2af0e1ea760e29532be42ff761b6b67b03d717e2bec32dfbe
SHA51214e21fff39e59fbcd0a3724dc15bbdf6810133818bf78b2c6934d637b8f52a1c85ef1e1af60e542317f1bc124e1f6e614d23a6186fb6d100bb0d38254b8d564c