Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
9599e7103d820a8dccd2b53a4311505c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9599e7103d820a8dccd2b53a4311505c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9599e7103d820a8dccd2b53a4311505c_JaffaCakes118.html
-
Size
19KB
-
MD5
9599e7103d820a8dccd2b53a4311505c
-
SHA1
b1f47498454042583e8377c24aea0e000d8850f2
-
SHA256
1f5c6e4006ebc33d4fc29bc459c60f016e506cb96ac8bc17728decbfa5badf15
-
SHA512
4eff915d93e764cd0d1630ed4d1e21060bd19930b33ee6bc867850d8733d9ba88ed2184e03a614b139158d1e4bdf057c79c660b2159e37a338b836cda05c86c0
-
SSDEEP
384:zibKhgESEVBD8c7MZQ3RKdwdMBemLxXucfIk99heXzVc9ZF:zi4SEgc7N3MapmQOIk9SDqZF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2020 msedge.exe 2020 msedge.exe 3712 identity_helper.exe 3712 identity_helper.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 4716 2020 msedge.exe 82 PID 2020 wrote to memory of 4716 2020 msedge.exe 82 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 4712 2020 msedge.exe 83 PID 2020 wrote to memory of 2072 2020 msedge.exe 84 PID 2020 wrote to memory of 2072 2020 msedge.exe 84 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85 PID 2020 wrote to memory of 3204 2020 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9599e7103d820a8dccd2b53a4311505c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba87a46f8,0x7ffba87a4708,0x7ffba87a47182⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11988647997794173091,17812075184856551856,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD578c6a5b7ad49ae5ba77f2c5f0ea91728
SHA16a7c51a304252598373ccc512951e6115edbab4b
SHA2568d92795778249b2c8837f899de264bd24a34a5d5b75babd949b41b00ad98d989
SHA512700aad72c8a5a12291e443a7b1883c8401e2e9ce28a005997e56392ff0e067c77ae3ad70561e30afcb1ddb0f40e401fe44a965e012fd28a1b87675dbb289cf0f
-
Filesize
410B
MD5e3e82f3762271430cdd82e04704da3ae
SHA1856db0be4bda8db428ced7112d755cb671543143
SHA256f366f3cb2cb11c052b6ea87381fcb5b0b7270a2ebc4de467a77ec294ddd8d572
SHA512a9af020c29fb2be83f3fb6848825b6c29dfa8febb04be3b54375a8cae5bb27abfe63702f4ed237d694c8137af4f306202e24af844608be8f3e73b92cb495a1b7
-
Filesize
5KB
MD5d750a4cb6c323a6b9ba7cbd67d40ecef
SHA1cad5c6945e553e7b340cc2c7b2aaa052f2942be6
SHA256cd0cb94cb9e5acb748d65ce9c5ad80fc4e363a6fbc0d5832806fa73a384cedd8
SHA512ce14ba25d45a1ed6778066d2fd31c99f909df09d0eb19ed93640cb2d6e9cdc0024a39a55cbcd35207cba63bcdbf80c1a8082b7501df6e4b408d2f1a8d4efb501
-
Filesize
6KB
MD51b84dbc57845c3f76acfe22951a1cceb
SHA1d7e4e126c77f1d05cd69e779b7c7daa16343762a
SHA256f8913ea21255abe04a5b3c15a7067fffd1b78190adeb49c69dd3066f14927019
SHA5125d6ef5a319545ad5d97cf5f7feaac0cec5a9e2e9901860981bf3e522acc0ce816b5a0f5568ce41efb626ebda662b7b4533253d4e1621582555dae32cc2e4cc70
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c34a5802ff9a5f9674b0f22c49f0d05f
SHA18edace0fe6b583c897798afc0eb772ffed5cb57b
SHA2565a80f5a08e64e89e07e0ef8bb0398b314bf0f4ead5e960dc3f1654d16f6da75e
SHA5126be50e609ee522aa2ac468eedc4079c694f6d8cc468348e15af2af9dc9281cb78dc2335fa83a3113726855cea8fb43c1acf38b892551b89c210b21b3d4dec9f8