Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
92622ce600958143498e3c1dc11edb0f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
92622ce600958143498e3c1dc11edb0f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
92622ce600958143498e3c1dc11edb0f_JaffaCakes118.html
-
Size
40KB
-
MD5
92622ce600958143498e3c1dc11edb0f
-
SHA1
895c90f7274053b480d546a9e57541d36b0df000
-
SHA256
ee3bcce19c8400aac78a4b23449c4815aaf27b948260081f20071c455c30f1ca
-
SHA512
1a53a2a6a0e620f98a69c287884264ad4838b8290d6862710d80397ad2aa5a21a8b85a7c9575fa3565689b7f5ba3b010df9f904323d6c0420f891246413febde
-
SSDEEP
768:1X8Jrpje0DnLmCQHNeTCINV06u7E5XnEzbd7aD7c71:1ipje0tIqV06uouzp7D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3164 msedge.exe 3164 msedge.exe 2116 identity_helper.exe 2116 identity_helper.exe 6076 msedge.exe 6076 msedge.exe 6076 msedge.exe 6076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 2692 3164 msedge.exe 82 PID 3164 wrote to memory of 2692 3164 msedge.exe 82 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 4072 3164 msedge.exe 83 PID 3164 wrote to memory of 3736 3164 msedge.exe 84 PID 3164 wrote to memory of 3736 3164 msedge.exe 84 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85 PID 3164 wrote to memory of 5012 3164 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\92622ce600958143498e3c1dc11edb0f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadfc46f8,0x7ffdadfc4708,0x7ffdadfc47182⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6584 /prefetch:82⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9395972715771401134,712941943021653632,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5b7dec9547a2aa6d0aec0d899546dfb1f
SHA107b77869bfd1672eea731eb02bfb56be25be618b
SHA256973835e418af3d7e47b39e59ca1dded974225ca2ba285c5f51b61e190549ee87
SHA512d3d3759ce5debcebeb311db6e1732a2248393a9ba6cdad70534437b83815cd96c7faf56736882b131e1f7dac63b33fc282b2b1cfb4c979d664759a9834f61d22
-
Filesize
1KB
MD5e6b081c9e6d3c81c8cdb65c36534c20e
SHA1fdd27c9a4ed023ca64c223ce408106efa86648f8
SHA25676d4acba68f68dce9c7786fac8e9146b381a36198a51479c8fbe45a43e68e901
SHA5123d9160ca3f351e4d35e9d6a76e80dcb5934430dec31c19400b13ee47e993a352a364e90a8c8a4f4566043f7c05444b8b9ca1aeed8ac3091365b87378d2aab62d
-
Filesize
5KB
MD580e993815a03b838c05eb35ef1dba280
SHA1bd3ecc34ef5a0da1dd5fb6cedd87c759ffbb9b55
SHA256ad105c539ccb939ab823655291f61ad6da02113cded93097b6c68f64c1322567
SHA512e12721d7c56e244465ac24361047f3f14a254e2817fbaf0e920b54f32658e217a1986459c39e8037762a1686367e50330fa684b64e24625249d0a2d1cc3a5f73
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d071b7f8-1904-4c01-91a1-4b56bb867e85.tmp
Filesize6KB
MD57b5686f600a633cd8c2c6e6829b20400
SHA11f82c99afbc8bf414305badf07f98dc2f3a71bb7
SHA256c77c3e2a879c3c120e7ba027e6eb5effaa0fc7fc37f6532cb6e86a34c3b7deb0
SHA512ca5b74cf6f5e0184a14408fbe1984892c49b002803e3ae99a46edfeff7c49fe2b36826658bc7fbcaa7cb40e69c4e020314a5e733d0a4838d4709e715783d8f7f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5ed04ba330184703679257bcf76e3309e
SHA14f0fbed7e7ee71bfa5f505f18704d876b3852f38
SHA256400412275e6121366343bae4ec3c52877d5c11b5f1ab2bfeb35b6f41a25e4ab6
SHA512541fd485ae30941faacedbae43f38b6d8eb5e0f4a2da0c6c4304fc407084144e1524e61e63635ab07f8f44ddf4289852a3bbba61e376adc1ab394ab0e1785165