Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 12:52
Static task
static1
Behavioral task
behavioral1
Sample
7d057a8e77a94d972c9164f41a16babf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d057a8e77a94d972c9164f41a16babf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d057a8e77a94d972c9164f41a16babf_JaffaCakes118.html
-
Size
39KB
-
MD5
7d057a8e77a94d972c9164f41a16babf
-
SHA1
169891cc505a88f29c63ff90d9f351e495316740
-
SHA256
6bcbad160fb4869e730f03e095d1474ff305a7219783b67439ab960903096ac9
-
SHA512
eec0652d2aa7d637cad9d78dd42579d30d2a914f0d95c9c974c075462ee40aa30ae705372a3e72a3e8afa6b98325303db6710292eeea8c61cb4b3dfe0f13f4eb
-
SSDEEP
768:5rvC4lxUMPD+a+rtNO8dPTYhp6WuJ3vtpGWO36:5rvxxUMPqBJNpWuJ3vtpGWO36
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2952 msedge.exe 2952 msedge.exe 3432 msedge.exe 3432 msedge.exe 4984 identity_helper.exe 4984 identity_helper.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe 2636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3432 wrote to memory of 2944 3432 msedge.exe 84 PID 3432 wrote to memory of 2944 3432 msedge.exe 84 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 932 3432 msedge.exe 85 PID 3432 wrote to memory of 2952 3432 msedge.exe 86 PID 3432 wrote to memory of 2952 3432 msedge.exe 86 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87 PID 3432 wrote to memory of 4368 3432 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7d057a8e77a94d972c9164f41a16babf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff825a646f8,0x7ff825a64708,0x7ff825a647182⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14287446669692377303,9181691865045058192,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD52961b6db44380f8d49ebc7407e2d9ef6
SHA1c98c25e97381d813451a8080357f43651264af57
SHA256e655f3947cdf4fddb051b7d562a5495b1d93eebff01bae2d68052b793e9c4511
SHA512fd81f53e98385bc1ebbf4d15c0bee3ee745ba5f9e38c26f8e5aaf2fd3469b69eb472b09ea7ca177ccba444656709c6c1836ce20958eada3c144434e7970ba9e9
-
Filesize
2KB
MD5a47bdfec9ecefd4e0e4bc74610df3537
SHA1fea3b36b031d04802764316df2740b65d4a69d4d
SHA25655ac37dde44d89b21bfb23ead0674eaaf8216adfcb1797a318e8be1f87e3c25a
SHA512650cd531196f0993353ed32c4f109e2a7ea35c545bb106265c2c0fb79db951c92b4aa0f35319467db342d35690b08d49c4f0fbfa9297ff950bb407c6e340f280
-
Filesize
2KB
MD5c99ec544ded1364f5e3ea1dccc0d7b2e
SHA18edb6a8fe4a586a60fa07b68d26178cb7e390276
SHA256e3aee2a236d2c8a5eb888593bd5328efa9d0d4e5eba2167962a4904230533205
SHA512c6fbe97a2509ae792abfd4fca1f1bb3a0da6fbd55cb34e0e95b8deb4c30adebd2efdf4736d5375eb2afca8454a1337322b99ca9eb7c3debaa2322e20a6f091e1
-
Filesize
5KB
MD57a528800f3d0dba0f76e24b114c5a449
SHA172f3cdc5fb9193a68749588b46cc1af3322720d2
SHA256e946133e30a5bce3718bdfdfe31ecba0623c0481f1ba85cc2c65be62238febe2
SHA512c3ab89d185d1881548ec5d9f8c45e35a58e0bb554d0c137ec28205b0e7ab5d3aa55a8f55b024fcbb27c47a1527cdd5ca75d13707d267beefee079e6e301819f1
-
Filesize
7KB
MD52a4d311cd50cb09a3548b882d5490d81
SHA1c4603e9419e0ebd14513cfd6edd009327a4e1b65
SHA256b27e8d5390fc36fb07fead1036b437774b562b88e22752b25335657e2dcc910e
SHA5124ab98f05393980f79786f6c03fd8859f3f2ba8a746725c8584b9e91a7c9a54baf8e64fea00567c761411ec70322af4781d9e395126a12b4d43e68caf6b74dd11
-
Filesize
539B
MD50bb6c70894b9a9d122f2172744c2956a
SHA1fd9879196092312b4142c05dc276702cc0985ebb
SHA25696bc369bed5d66e451b4e3de5417de812bcbd7dc7d6f4fc7ea4fcce37864b092
SHA512946e1979d346d99fa33ce1d82f5e68c73114d7b58bd370240f461ee42665d24574824d96be0bcd4f9708f9795c8529b0e324d8e1cc4d135ee4cdd6ac7120610b
-
Filesize
371B
MD54c4bbbb4789611c6beef529aeeb4423f
SHA12c65960c47faafa3de02112ee5fb08cd8164ae29
SHA256bd0de6050c14b87ef25b45893053100da605c406a347ef651f547e7faa81f34e
SHA512033c7c4629de55c0cb08cf1468a1cdd9be0ea9754c140451223ee1c2274b412d3e2bd8107d27509a978495cb3d4510f5925c2b1a7b659bef6d7a74951f67467d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51cff37c139e7d8db96c2e317d314791b
SHA1def6f8a021e2d2f9f285272f2a39c6c0e398a889
SHA2568313795c01cc0d03b8a854e1b156d4357c8ace954b3ac343fba11158cd8403c5
SHA51240e6124320fb5fd5c90d605d8e895cb744454121c14efef7d3adf78248ff5ad31686541934f4999f44c468cf862f74d7bbfeda9ddbd1bfd4b60003108f6e9a07