Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
85099e1e621578a7301ccdcb4272e4d3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
85099e1e621578a7301ccdcb4272e4d3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
85099e1e621578a7301ccdcb4272e4d3_JaffaCakes118.html
-
Size
62KB
-
MD5
85099e1e621578a7301ccdcb4272e4d3
-
SHA1
30ab43c8b10f08e8a1f6e5bcfde115a0f78206cd
-
SHA256
de8ec2ebac1ea9f26494c66eb3458ced4a340f5cac740fdcc3defe9b49cd357b
-
SHA512
a66bbbf2728396c40fc032be9ef9c2f14bed9423ca3931468909206dd60750b20bac0757ac685d3ce770e2e264230c85bdf21d56b40af84e2b752cd023d59a5b
-
SSDEEP
1536:D8lJTYrUkTFvVO/RUEB/4fSF/RZlqVUDDkWtxujAODZdtN:OGLLfSBRXxujA8tN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 1784 msedge.exe 1784 msedge.exe 1680 identity_helper.exe 1680 identity_helper.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe 1784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 3016 1784 msedge.exe 84 PID 1784 wrote to memory of 3016 1784 msedge.exe 84 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4572 1784 msedge.exe 85 PID 1784 wrote to memory of 4656 1784 msedge.exe 86 PID 1784 wrote to memory of 4656 1784 msedge.exe 86 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87 PID 1784 wrote to memory of 4596 1784 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\85099e1e621578a7301ccdcb4272e4d3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd711f46f8,0x7ffd711f4708,0x7ffd711f47182⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,10254177240343213616,11240904309243386375,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD57b6b45c8fda199d3fff0824ee17e6f19
SHA14fc73d2efe709533d0048c5b724f6d1a739f776f
SHA256383016443f131de86298833aef241159f67a68e6a865a1cee9758c76e87386a5
SHA5123378dd4aeb23fc825514905c3383782e2b52bed47a1839ecb1b2c23ca45b1228d9c4264dfa0a496911b96a0d2704441bd93ff8f110479364f479e33b4de612c9
-
Filesize
1KB
MD59ccaf7edd4bfc231952b5cb6354a7aad
SHA12f775e9d9a2fcff05db4df1cb81045f45b44eb2f
SHA256806ef521eba6bf5d7ffefec7676b6455b28b20b116a4c05d1f0f3296271aae95
SHA512f0f678d9a948fdf4016c3bff5d23a6deb260ed0c3591d1970c8b7c2a44a1795e40ebe4729795b70c8167556d1582f1eb919a0489f54411727b72012156226509
-
Filesize
5KB
MD56fbca1c914f8f11610676268ce3b60ec
SHA1442d6803a600dae0798981793e6252437af7d801
SHA256dcde8f39db1344bbc8f3b9df4885c7d837bb7826720100921a209bc44a7d3e18
SHA51209a1c247a3bdf7af31156ad559ef3f65f6b9718f469908609b2854676c7fbbafbfcb83edccc6697cc8db9b030d7cba63c1caa1788a478780d9e870109ba1e57e
-
Filesize
6KB
MD594cc952b06f0d01e3adc4bf98c4a6130
SHA15c0d2676c17f279a6f2dba97e2a77f1ce39ade1d
SHA25635ecb73f37c6bfedd48cd792c89acebd96b14dd53b558eeadf02616e3873dbf7
SHA5128ade9577eda6a1a20cde10830f36e037b72d5192c406047d55388bb5167c5a4300a9a262732a3da92fde4b2c587ce830a3704608861235a56e62774c6b7207dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b0113bb94c18a40b6fca21281ed2762c
SHA1c4a7aa56b248c4ee4663bd83948dcaabe258cec3
SHA25632e6b48bfda3c31a72dda53b8f45d86349b9a9026c4707200db84a7acd35dd8f
SHA51298b07f8fa6a108f72078e189d9bec4e9d7db43990e19f27443585a94a67d5e0c3fcfcbc295daf78cc3e07f8d0230540f6f00fcc7d8d7648361021334c5c7f968