Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
7c8ad55948ee4a187b6cee89f176f105_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c8ad55948ee4a187b6cee89f176f105_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c8ad55948ee4a187b6cee89f176f105_JaffaCakes118.html
-
Size
35KB
-
MD5
7c8ad55948ee4a187b6cee89f176f105
-
SHA1
ea323e8747a2fc7ce08c975676b4b7f39cdee5a6
-
SHA256
ec33ee24b82f1f72822c151a95c5e097c3400a9f5ccb8712f7fd772901dd0876
-
SHA512
df4607cda6c21879952a62ae89320117c2044015eec6dd549107357fed90c1b63bdc5fc1d9ee346291bd1683fa37e488c91d31e3897e334abd4bf3c92bd18159
-
SSDEEP
768:EOrXuYcilMnqn6MNlp2uPKOf+TbGbcu/rhDGpLurPieeE87l+TOqs2rPqNg:EOrXfcilMnqlp26KOfybGb7rhDGpL8+0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3116 msedge.exe 3116 msedge.exe 4068 msedge.exe 4068 msedge.exe 1640 identity_helper.exe 1640 identity_helper.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4160 4068 msedge.exe 82 PID 4068 wrote to memory of 4160 4068 msedge.exe 82 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 4488 4068 msedge.exe 83 PID 4068 wrote to memory of 3116 4068 msedge.exe 84 PID 4068 wrote to memory of 3116 4068 msedge.exe 84 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85 PID 4068 wrote to memory of 2484 4068 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7c8ad55948ee4a187b6cee89f176f105_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc66746f8,0x7fffc6674708,0x7fffc66747182⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2444 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1976 /prefetch:82⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12329144056846602514,9947415653117632948,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD52f8fa5bb47c9e5c0e9cac0aef8d04bd7
SHA156f969875f45ea2a090961515f25f45a314ed7b8
SHA256bb4cf78703a1764752423be5b9b043e3024cfed6726b9e4e021306bd72bccd31
SHA5127b1046959f86d2030a444d29a9327af5a6286fd8e83307c8010598345d8acbfd532e76bfbc89e440331fc2acb7528322fe84b26888eb45f437358f9e6fb0f23f
-
Filesize
1KB
MD5261ff6311f8df428e189d0faf73dddb9
SHA1093d16bae34b18757172417d0cbf9478c7ad8608
SHA256629be741cf306ef014fcb19e6b88e3dfa7353d86e74eee35dce602ff463086f0
SHA5129d1635ba2be0af83573a7eab5e4a271d18f8dcc78dac4e1138f77a2166464535f0894d04b01048b7a993c90e2e8b0b10ae3222d265a61921bdd41c065da76a78
-
Filesize
5KB
MD5ff7b0fd2271bee68485a618ebd9bf957
SHA10a32f17bf553769b8a01bf8781292d490cdae29a
SHA256a3b96dece74bc2afb85c970872834c3e4c8f0a966aaee2f2ded6a112686c335d
SHA5129f0785aa04d8362e1d744883870d6e70b2a9883ac845a7406282927cae3832afb48d167120b0a0d1b83c5833a61add7e18f977e0b21bb7fc63f461fa835d999d
-
Filesize
6KB
MD55cb249e4f5d643b63cc4035cf7c84a62
SHA1df0c826ec911e8def185168f91720a8a99494e34
SHA256c4294f1aaaf409b09ca714316cede767f4c5b072a5946134bc4b9301dedf535e
SHA512b6eb6836cf1fd33b4fe98f20cd4b4a4fe8c9809c484fec305f73e43ea1eec8a33b9c6d0c91a577b85c6f0a1123593c6e47e5163f68ba3714b38d1aafeae45f85
-
Filesize
6KB
MD5ff32a7a783a2f742fe55c20f090c3c67
SHA1eba4b4fc10b07fb518286e607f785fcc41a5928a
SHA25649173c6527b11a4477aa3037afd8b0621c9dc751459a46f86948d28a6b691f33
SHA512a84787c42aa23127a7527a0ba277bcc65ddf068020556a6b1d408e15aacd34f02fbd1e0d86b9d06cd94021fb6abc31f200047a2bbb63e28ded118fdd456ea6dc
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5804511331f0fa249f9eacf53bf9bf168
SHA1f551d606cb86782ec12c0d8c11d54a1402560648
SHA256b2ac0633730993d1c94389915e5f3bd8ce80284ebde99bf844cf1c34931c6d66
SHA51272a085b66922c5b65d97bbed1dc4333bc092eb044cdd67fe5fbef3b37e8541895820895b2cd513ef21f46af12b152b2e650fc522a5d26c552aebd73b8b9526ff