Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
9673382220d09a74809df5aa38b70c08_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9673382220d09a74809df5aa38b70c08_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9673382220d09a74809df5aa38b70c08_JaffaCakes118.html
-
Size
41KB
-
MD5
9673382220d09a74809df5aa38b70c08
-
SHA1
1086b0ad3b55b32cd7582629a6e5dee1549ff36c
-
SHA256
8469840ddb77e84156c3c61c8109b991daf1e8dfa45eb2beb59c394df2ca6b66
-
SHA512
ec3a2d20976850efebc1a3e6fae13c8ae1b7f81019674714f25ac5a152f2d4f9c2216049e9333d7a540dd0905938a1ab9f0e9b0aed4070a58994cf8e2379a99f
-
SSDEEP
768:pFEbM1bgJ+b2vbnuv67/29bNK9uDtGoGe701JH4JgYAX2V4IrP:pFECEJ+SLuv67EZK9uDtGdXtZGqUP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 620 msedge.exe 620 msedge.exe 1396 msedge.exe 1396 msedge.exe 4772 identity_helper.exe 4772 identity_helper.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1008 1396 msedge.exe 83 PID 1396 wrote to memory of 1008 1396 msedge.exe 83 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 3208 1396 msedge.exe 84 PID 1396 wrote to memory of 620 1396 msedge.exe 85 PID 1396 wrote to memory of 620 1396 msedge.exe 85 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86 PID 1396 wrote to memory of 4520 1396 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9673382220d09a74809df5aa38b70c08_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff824c446f8,0x7ff824c44708,0x7ff824c447182⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6017656052891977233,4188858364992305600,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD54df3087ac613789f5268211422f5a316
SHA15ea9b1199246da4a912e4a49b455526a5ea34c39
SHA2561be3da1b432b8edc2698cf5fe08b52698762a954ea6d6e96fbf07d4f954406af
SHA5123e30471b8326a10009e14439493e27ee9363bc9f83bb5328b50c409a3c81134b16363d66edc26e0967cd26c388f0466bb5655ae69da154e40c25034c4ed0e002
-
Filesize
5KB
MD58797475dc50a71ea7bd5ca36b8f647ec
SHA105a36bf8eb3c7d3abd172b0a60e1f6cf018ff83e
SHA256ed784c13b638e209c0ed7f3321d29a40b64f26aa399f7361fe08d3188b7e1e21
SHA512eb951b5ff149c48f74a0489cf66e51e0c9289428e340f4b2e2627c14b1448c7e97f260bbddc71e6b03332ceb8358e998fe22e8280d2ade65e1bdfd481fdbae3c
-
Filesize
6KB
MD5bc50c0ee17b55293a5bb9d884d346d43
SHA1bd87e2fbbf92f80fd7be6701e2cebd5c1e84221a
SHA2567814d671b4d2620497a7f794df89ed3271d7063b714652d36a77b262a3c31079
SHA512f7630cb88338964d62d20e61986fb3b5dfeb9d2b09103e639fd17439b2f3b077eda91b86055372d94c982f99b98931326e37184bafb24808d8125de2ce3f7a4a
-
Filesize
6KB
MD5786bd3ec67fcd6d6377339315b3a80d5
SHA1bb19149346e40d0d987f473ae4535c06a7d6b45a
SHA256a3361a55c8d907c7ec32f1e28849b23493da19082396ba79e329fe8746ba0ebc
SHA5126ae22b7b11170ddf53a227fbb1728adc5c8b1d250da40225dc3cc8f2ca58a7733979b3510e6c4a9a44e48b9ec5b19ef178c2e99ad900e45f2b292c46cff5272d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52b5e21c8fe9b3d37cd738ba441833f49
SHA1af8b9e4a7946e7010424834541832c5ff90191c3
SHA25614dfad6d29a29401ca49ef2c02360b6802d655db3c9ba0ffd80cc4329424dd37
SHA512407aac9c10b96f9606637d8eb9927136d332b1fa9433e53e1199fdf364f7d5c72acef6c50c513d81a4731db2f10c46065bd04c2b811af16f90b3e834eef4d85d