Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
83dcbe4584253f4647a7b83e375ebda1_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
83dcbe4584253f4647a7b83e375ebda1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
83dcbe4584253f4647a7b83e375ebda1_JaffaCakes118.html
-
Size
19KB
-
MD5
83dcbe4584253f4647a7b83e375ebda1
-
SHA1
26798214fc78e9f0d067fde8684a455b271ccebc
-
SHA256
30db9bd07e72c2cf8608ed85e1347dea6b0c589dc3e6588d5630badd984b0325
-
SHA512
80cfd99e82d0779384e4e6d540af3260f0b883c2620be1dfb1a75981b7f7ce35257a081276f7dc9accfd33d91042c938027fd2ed887ccade16c5a78b7f423d79
-
SSDEEP
384:zipKhgESBVBD8cwQ3RJtTemLxXucfIk99heiDzVc9b:ziKSBgcj3/kmQOIk9Sifqb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2872 msedge.exe 2872 msedge.exe 4072 identity_helper.exe 4072 identity_helper.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4424 2872 msedge.exe 81 PID 2872 wrote to memory of 4424 2872 msedge.exe 81 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 3116 2872 msedge.exe 82 PID 2872 wrote to memory of 2204 2872 msedge.exe 83 PID 2872 wrote to memory of 2204 2872 msedge.exe 83 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84 PID 2872 wrote to memory of 4984 2872 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\83dcbe4584253f4647a7b83e375ebda1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd944946f8,0x7ffd94494708,0x7ffd944947182⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,9528248845051526851,15033531053611646000,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5989a3b49c90c83b179405896dbd420bb
SHA1d4234784681506cbd0639a68d4b86f21f1404f7f
SHA256be29572cf0c91191d215cae8127da4d917589011848b7146292d2ca182cface2
SHA51232975c30179225b4776631595d72f656f0ddd54b24532c16b1b9fe0ab03d4b001ba7e3adbe3b20572531aa904680a6b904cb7536803a53ea1d2ff1a0f8a4e065
-
Filesize
409B
MD5207b720d3b1d91df88ac12f25a01e055
SHA1c463fff3bd9c8cb4cf196fb598a580e75285c1e7
SHA256f8c1adae33fa2d241567d7de737c2d0ba933c8d1214523b5acde421f2f19954f
SHA51277a2a4e4f5a31f02465b57ec529c3055902fca713384f677c1663f607c1b5a0ad5c2656f8623339f4a8ddd36f2a41c7c6c1b9d3b01c2e53939b5ca5bf9c563ab
-
Filesize
5KB
MD5d74e81ee6671436672b8251c940f6adb
SHA17c0bbc9ffd6ad528973193ea3337859aac583a25
SHA256b846d22cc4f308c379f7a31ebdf55344ec1853bac975c86f7e33ead7aec56689
SHA512b7af48d8548dc5be4c581934e080941c81045e630c71f0701eb416be0dc28b3bb5eb6845823eec295ea92bb9175af609b82606396511d852d0d2f6437737c170
-
Filesize
6KB
MD5264d2480adac8950e4282ff6fff5a166
SHA16167428fbad77104d25b62b3f032e7959bfb9d6b
SHA256f2a61e43b4005dccadd93ce1f9c915b620b1691a03a5d2c4a56c9aba6722069e
SHA51278af4a97baa4d86944020eddb6e8a5b101d4f452a0adfc6f431a68cfebd6d8e049ef9641a7a3614efc2bc5fcd78a430a3bb6ec6462ff77919c0f4b9741bfe17a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dba902657d5d76d1a7f2a90adb392f47
SHA11a8ab58c99b9913e8d545fcee8413bfe0387ed6b
SHA2560a263d1fa8b0b734498af3c5f9f1199a97c2d98e7f1dd51e3b53875eff3140fe
SHA512c0a977142c1a904376eb77e7c453102399aa9b784181cfc5e717084a3ab670df13ca29a074b27105400c2c9c3099a5a9cbed8e90d056f58806778ef8a3bff79b