Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
880035dabb4a172f1f88d287a56df3f5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
880035dabb4a172f1f88d287a56df3f5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
880035dabb4a172f1f88d287a56df3f5_JaffaCakes118.html
-
Size
21KB
-
MD5
880035dabb4a172f1f88d287a56df3f5
-
SHA1
5664ff6ecdaf1795fd99871140f8ad87835f0174
-
SHA256
fa9fe5165ae67fcd823386f84740bc28ef174df880a879e6c972d238d09c9735
-
SHA512
8b6d6b86e4a16d931ab256c6ffe63c91eb8c3cb4d0e569ac60d3364c0e2356da005c28ce4b3403c8701b683bd23aac5fdc18402a3ff6fee9d38384f266e001c7
-
SSDEEP
384:baneT9KhsLimyVUqiSiDfQ3akZT12f9muuwJYeFwMetyV6yV6yVQAhyV9skkUg+k:baneT9KhsLimyVY7DfQFdIfzr3ayV6yL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1268 msedge.exe 1268 msedge.exe 2504 msedge.exe 2504 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2504 wrote to memory of 228 2504 msedge.exe 83 PID 2504 wrote to memory of 228 2504 msedge.exe 83 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 2372 2504 msedge.exe 84 PID 2504 wrote to memory of 1268 2504 msedge.exe 85 PID 2504 wrote to memory of 1268 2504 msedge.exe 85 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86 PID 2504 wrote to memory of 2844 2504 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\880035dabb4a172f1f88d287a56df3f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb611046f8,0x7ffb61104708,0x7ffb611047182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2836 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,471598785738411928,6473029620103875152,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD5da2a648cca5d26c05acadfe5df8805a1
SHA112c3555dd9288391dae06161a1a7ed796e1f9298
SHA256f5e062c88148b7c4ea3eb902b9565cdaf972f219600f3acb770e10e010e8c30f
SHA512cfc81e74c6845e517466db8c39a9957ac1ed65ddb1740f80e54e4b95f913c55bf34d89c77d275240b8d5f33ee317fe18171acc52acb69f9f121335a97c0b7110
-
Filesize
2KB
MD5b8419ee46e4f2634f2200130e24e3039
SHA184ed0b02901dd819b637886b9765f9e677d00b82
SHA2564ffd26dd5bff871121c8626b7c3a2b59f7048941277483e57b525355b54338f5
SHA512ef13fa35cdbb1440b08cb38b4b1f4aa6623d9fb25c8a8e9566938503d701abbcf1f5c52a3a2d9517691e50342528cc0f79699430d89a6ab170e17981c2bad575
-
Filesize
5KB
MD5ebdc5a69154e39ec49731ccdff74de77
SHA1ef0e7173d984d39087f5d6b167690a1860577dd3
SHA256b9961935bc3f042c5e97faff3c56db24f6d20ff1f8e785ecc195c2ba61eebd09
SHA512e386b96e6ca1083d03eb26e80a8e8d0d9f5bb12d8e81f6bc3635a95fd31961a4c47fb4b6ea6aaf39e4423742d60c05ab25c795cfd25dfdc5a138b0d346a981e4
-
Filesize
6KB
MD5a30cc30d7f1e3552bde277357876b158
SHA13aba7fb8e671543f39f560c12a874c74b010cf85
SHA256764aabfee0ae1f520da39065ba7e46198a3fc1cde89dcb359123f55066c80f0c
SHA512cfbec64ef637dc00b3a70fea7e99c7845fe2ba6b76495c5b3b9985e5ba3bad5fe295f01acf6cd9e3bcbf8fee95f6e71ac5ffbaf60f240caecca34b9467044d6c
-
Filesize
11KB
MD542a940f1de79ecffc4ce62653b190a32
SHA192ea3eed5164d6dec247dcb950ce96095d1e5813
SHA2569ab5668ce1da66835cf2295819576ff5faf0f3b0c29cf7e17f76541d77d583f5
SHA512f33fef4a6178f3316fc2cedaa09d805885b29d02562f967bf4038d3cd97ca537763022c1da6dd0f93f8de23d03dfa77e59a36f050b6c431cd6f2cb8d80d4bcd2