Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
88c6dffde756fa976d829e237375a077_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
88c6dffde756fa976d829e237375a077_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
88c6dffde756fa976d829e237375a077_JaffaCakes118.html
-
Size
68KB
-
MD5
88c6dffde756fa976d829e237375a077
-
SHA1
59c82f98b200bf9d212004bf16d06dafa2269834
-
SHA256
010c8871c1801d47ff36ea21b08218afb377fdb54ad222bf2760a04710a06129
-
SHA512
6f545aa0091a4da67aff07e54f75974a929d557d533d972cd43f1a280f987681ad70535a5491d517a29ceb74d398055b8365601bbda500690029085db840f217
-
SSDEEP
768:JiugcMiR3sI2PDDnX0g60JpUDq/AoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JoJYadTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 1496 msedge.exe 1496 msedge.exe 2728 identity_helper.exe 2728 identity_helper.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1048 1496 msedge.exe 83 PID 1496 wrote to memory of 1048 1496 msedge.exe 83 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 3048 1496 msedge.exe 84 PID 1496 wrote to memory of 2452 1496 msedge.exe 85 PID 1496 wrote to memory of 2452 1496 msedge.exe 85 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86 PID 1496 wrote to memory of 1472 1496 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\88c6dffde756fa976d829e237375a077_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe69fb46f8,0x7ffe69fb4708,0x7ffe69fb47182⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14641819368715457556,11608507640225250346,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5ca295a78fba63020fe5e7e53379ba3e9
SHA11a48b3e499d3258ac83552a3dbd8758f75908e28
SHA256958f1655ad31fc1f154e3491dee15b023e1dea7f08a24ed84a4b560e050611a7
SHA51259c4d04f4f129fe94d9ea2176298eb8355aaa3bab6f8ae183a597d724d5de2b506a7e5b7a5e9c1ea69e02c07e153b98912c2dfeedbecb3bdd0a633ba1a7b2a8e
-
Filesize
350B
MD57ac4cdaaace0ec861ac8edc1e38e3dfe
SHA17a3bfa18601d69e090a73768fdf0e8ce2f0b726b
SHA256c204158afa02c5f5b2bae52785672a8d0fb17f2b556632459da2def5b09a6efd
SHA5129976c40845ea0d05d9e5efe6f2cce46772ad1662dd93ae822d4c6cb28f6aaae50dbacb65edf89d9d15e939abf8ac6853abb21bef0903da1d9c439e203ae87952
-
Filesize
6KB
MD572b241ed1b966ed1087660481c74875b
SHA19348c42ad9b339c514fa6e7c8a509158d73aa4b8
SHA256f1759eca277b3a6955783ae19b5090ee8ad0314c8b166b8f2d7f2847b0b60091
SHA512586ff072c0c0ce8835296f19f5153eb6a0b2334aa684ca0e5871051afff3f494a18090271dabf21d66028584016b112e7343c6d2246de0f6e92d255254804dec
-
Filesize
5KB
MD5753170b98698aba52daa9c1b03dd04e0
SHA1c88be7d759c60a3195bfdda8f17d94aec722209c
SHA2560fc4b28cd8d7817123f2defe6875095c8f2ae3c110878a9114604cc6e9611b7d
SHA5121bd5beb2acb3d2642de2b57d1ecd4ac1a887a0a6580654316e5c627dc7f2b6a93f4fd3d5f11021dcbc8ce2d9a4ce97821488b70958ee497f82f91e1ea0cd9d12
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51e274b320f3f4e4fca8831d4a6672d39
SHA1a2c557279468980d2d41ccaa886ee865b45b2108
SHA256365d639095deb5526d3c6bac4e3d35cdb577c699a9f3457287a1ffbabbb46428
SHA5126e030fadb0776fc5d3bbba4ba4698bfe45940767cf350021e1eb81d61052ebae83d2fdab0f7a3e2f41798e401a90c9a549d86d77d39ee23c37afb311eea3ad32