Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
875b51cfa812a51391e63b9cba643b4f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
875b51cfa812a51391e63b9cba643b4f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
875b51cfa812a51391e63b9cba643b4f_JaffaCakes118.html
-
Size
222KB
-
MD5
875b51cfa812a51391e63b9cba643b4f
-
SHA1
62f6188c8fa3b68c5f3a92994b7a7ef5e56718eb
-
SHA256
13752b2d09c597a9ebd05d8904b2b62ff490706813bebf21e40073f402bc6098
-
SHA512
7477d50702821b1cf72734d608892ba70bff762840260244454d1fd25b7ba29816a95173614655636c6c56cea89687273d61c046b69f514b126eac567e92afce
-
SSDEEP
768:jWDLVWaD8AwDHDIOjAeDT3cMajprz+OY6wtnak6MJEnMSOBqCL2fI9xDAzLuGvjd:yDLz83/laspSgPvTbKJ3Wz4sb0lZGPbA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 1076 msedge.exe 1076 msedge.exe 4316 identity_helper.exe 4316 identity_helper.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 3028 1076 msedge.exe 82 PID 1076 wrote to memory of 3028 1076 msedge.exe 82 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2472 1076 msedge.exe 83 PID 1076 wrote to memory of 2320 1076 msedge.exe 84 PID 1076 wrote to memory of 2320 1076 msedge.exe 84 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85 PID 1076 wrote to memory of 2292 1076 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\875b51cfa812a51391e63b9cba643b4f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8e0146f8,0x7ffe8e014708,0x7ffe8e0147182⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,11472566662172023706,18242183155865442591,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5468 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD50e36a68ff324bcddddd8ec0553189d68
SHA1300afe92c4a2da82f9e3353d8831be321d94f16c
SHA256b7eeaad1a52b8fd58e5e5d1023ae766b6a4a58d3ff5b2758e8d059b6d7a2855f
SHA5126ec2c21417d0b8e683eb052822b2733e50f1c39b7c4772b5a4695f460badfa1bbe32a2f529f31c589be579a7424c27ec71058cdc896d40c4e13065d8ec21b244
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5348ad01c832af43bfb8bd2724df5b657
SHA1c7f4025fb9d4944cd7571e9c2fb89ec5a8babd8b
SHA256e2fc93467029fdf4e7a20c804ee730bfb11869b87d1a1ad20f478841432e0425
SHA512c5a0c235b8f4b373d1e93d230395eba88011584cae8b49bf6e0081f8e31f51bbced928fb0f339bf5e38548355b535238a754fad7c9359ebea8b58320aa7cbb72
-
Filesize
1KB
MD55ac270e86d50a2440bbf7aa180b140bf
SHA1d174899f20a28c419a49836ebd24ae2e88cea877
SHA256e644d57f569adda075e8f1379a260d57eb7a65279292dfc99c81e203cfea7ea8
SHA5123b7b6f07d26cdbca0a7a54a85a91c9ebd80c9757792c1a1257293bee5c90004d977e4a2dcbf1cc08569ea72a80e455c4339265e793c01e14e308de6254cf7df4
-
Filesize
5KB
MD5026089413568c3c61237eba8c5432fb1
SHA16024c168af9767eef3d681b071b892641960c2e7
SHA2560e64074ceb5935f035b74c171c38808198a152042351b9a8e1a259f1c6976660
SHA5120cc75453d8b26870d71cf28ce85900d510664066071ca8a7c2a435a4a2772e28779ea8ba42fd8e63fa68bb91db36a6093f09ca09992a475905afb4a298261716
-
Filesize
6KB
MD58544c0b34e60cddadca8a967e2d26fe6
SHA1b2a3f371ef0290014506f96a70a854fa45dff958
SHA256a78670a8d41fc7befa14a91fb1683438335509d2cfc1b29231f92ab235e9d655
SHA51272c504a2dbfdbf3920f5db93747ae00630f4b665652e7bf385759c064cb074da28e14378d3b29c595004c088334daca1d42b3949440738ae2f742e2c7bfd4254
-
Filesize
7KB
MD50b0649a1001c8060ce29162541ce4514
SHA1b8d9fc84fa657e5357e065f0e86266cdcbff1df5
SHA256938ed76e1dfc3452c83c91ee542e1f1ddc575bab20708af7788a44b39728fea2
SHA512aea21a206d10445eb346407d186caf6c772a3aa46b940c6428f9488384d90dcab4e6269068faf671a88d20d27f942c571b5cbb9719b1fc94e5a03647b04c6c01
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55c132365c641c3c38550850da1164611
SHA12044cc08edd728d187636ec54002c1488fa3fa34
SHA2568717ba4fd04ab6f9c0f72ffc3f687d29c103923db0def423f936c08f1bc1e9c9
SHA51217ab6e5cb9926a4eadf1ca4b57f035fda61fbfc13079df9ddab3406071b4d3d47f6f3a1274bc49334398c6b9c231f1b05fb0bdb86bed807bb9a5f44677735289