Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
8ebf5665da5134d39ba1999d3f1750c4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ebf5665da5134d39ba1999d3f1750c4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8ebf5665da5134d39ba1999d3f1750c4_JaffaCakes118.html
-
Size
102KB
-
MD5
8ebf5665da5134d39ba1999d3f1750c4
-
SHA1
88d11414b3e8c0fd3b7c1ffea81f1a91a3465fc0
-
SHA256
6f71978465c695b55ffe0730585538e5320615725985b681faaab3e4531a0e2b
-
SHA512
3acce7e8f3d0e3b299cc1dbdb81bfec6e9ded3c853b749f9279db93d6bf02defa593a53404a46cfb9d759b78e36217a29a06f43ee75c7d55d5e7c4d99a559543
-
SSDEEP
3072:VkQ+Hi7b7UkWgMRi2PY6/rpKSOEyCI7puH0ny:512PY6/rpKSOY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 924 msedge.exe 924 msedge.exe 4852 msedge.exe 4852 msedge.exe 5184 identity_helper.exe 5184 identity_helper.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe 3204 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4556 4852 msedge.exe 81 PID 4852 wrote to memory of 4556 4852 msedge.exe 81 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 540 4852 msedge.exe 82 PID 4852 wrote to memory of 924 4852 msedge.exe 83 PID 4852 wrote to memory of 924 4852 msedge.exe 83 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84 PID 4852 wrote to memory of 5632 4852 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8ebf5665da5134d39ba1999d3f1750c4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1ec946f8,0x7ffa1ec94708,0x7ffa1ec947182⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1551766920124375095,11287007678177216155,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5a7cfffae5889aa3e1de9e375b69056a0
SHA194621a6a7042dde06980010f324ebb351fec5f36
SHA256a07d337915d2b7b71719543a7727d541e61eb856ed0205b4d9e4af80382a1ab2
SHA512aaebc671181e2fa0b39ecb3d45d62ca4daa2e9b575dc56f8c5548fed4d895c1b7cf09038c08bf30ad113ba6f39d836e1d00b37520bb66b59eaf79a7bfeccc9f1
-
Filesize
1KB
MD57b70313b856105bf4d5042ea06db6f3d
SHA1226c1d04d8658157c66b555d3180501d26d5912c
SHA256f6c435d3a77ccb5ab221d03adc45dc206680ad293165b6ae30e4ecb7572f5d4c
SHA5124decdc248caf0835f358ef410f31f5d470308e32746b89c3adc1d2eaed5df6d1c5becb47c7fa7240bba36fa005b967483558095ae18628c021c34acc5e72d18a
-
Filesize
5KB
MD511b68409a43bc40cf1c9b1de71b2eb4b
SHA17b5b6c4f3f2b63e7c03b9fb5c90a35ecea4f3344
SHA2567edc0bc467a28d447883e8f33f1bcdc7dbe8d4a0d1675d5a8bbf5a4c86769fa0
SHA51251d36f75c32bcefb0f44f2d6bd87dd78cea16f0e9811a00f288c8f77772b0829503323c6c457705d572b083fc09e30d911e3f03ac82fa3d1e3f6dcdefd0316e7
-
Filesize
6KB
MD50d1eeaaa4915f57f19b1d62b2e9f541a
SHA168e113ab1eb739c0ccd59a0509f2051eb615ee54
SHA2560b2b9c353c899e0c6e6e07dab6bdc96cfc9cce0da96e4f2ce722ac175606ea82
SHA512803be4c58e1f11b8f7019c4be606364f2d854a9e6fa9416b9c3ebf2ef1dcf21a598e88d8436cfe3e2aed9ce18c8adc62b07c3645104497131a62a4818c090091
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5750524e125bc7219eb6118496cac2066
SHA1f23e246e40731b0b0e2f0322c3bc88658776552e
SHA2566d58b36b10b9f3d07aa1f5becd31fb9c0680a9da041a49f07d3b4ea39fbfd39f
SHA5121640f127aa7bb8d55b4ce31ec182d036687cf224991af9e7dd6926b5fb7ca0ce9e76c39934e3979a6a7016bef0f64a1e2101551cddc2c7c799cf3ed592e6ac32