Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
992e3d74893bbde87fe4ba0c9aefa2f2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
992e3d74893bbde87fe4ba0c9aefa2f2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
992e3d74893bbde87fe4ba0c9aefa2f2_JaffaCakes118.html
-
Size
129KB
-
MD5
992e3d74893bbde87fe4ba0c9aefa2f2
-
SHA1
54caf97709a9912d1065c40df275cfa63468c5a6
-
SHA256
75c0813d5cf9dc248ef677bbb8fc6c56593a39b70f481a42db8596556c40f575
-
SHA512
727d5e71a8ee6650136f3b62cec55e7ed5f632560aa45d9806b7164935dbcd7d9aecf0b45d370507be0200853567d8c9f42949e89742eaaaf362c3e859304b40
-
SSDEEP
3072:UCJbJyWPYj2/9rCX7CeLsJ/KMtI1VWWPf+0:iyVk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3960 msedge.exe 3960 msedge.exe 2392 msedge.exe 2392 msedge.exe 3908 identity_helper.exe 3908 identity_helper.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe 2392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 316 2392 msedge.exe 84 PID 2392 wrote to memory of 316 2392 msedge.exe 84 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 4760 2392 msedge.exe 86 PID 2392 wrote to memory of 3960 2392 msedge.exe 87 PID 2392 wrote to memory of 3960 2392 msedge.exe 87 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88 PID 2392 wrote to memory of 4076 2392 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\992e3d74893bbde87fe4ba0c9aefa2f2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf44a46f8,0x7ffaf44a4708,0x7ffaf44a47182⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13756207183641775091,8972495476355231167,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD52678dee4f18e40ad73a89cd9cad53fda
SHA10e86ae0fc229881c2a177b0ccfa75ee6c05e2700
SHA2564caad3cc2ab8051a0950e69430ac5c4f2ecc2955a6a817acb748444e7907af1a
SHA512933fa700a7ec230e2a3d34f8924d74ce3243783cae616a2fa4c38985d037d22162f2f538c7c3e975bea7eed7621f44b60a827b2afc0fb4111a73644fa22d8508
-
Filesize
2KB
MD512f03fdb723645f4eb264fa899c421b7
SHA1a7ed77c5a8f6f6e6604eff59378a3f9f8a3d829e
SHA2567f25295155557694021c7f085eae430d6bd1a2bc299378be30e386ac6c9cf2aa
SHA512048e7138091f82a2e0caee7221a8f496a9736d403d6630280e4a10dc95abd207a8de817e23b9238c8d2f7a175cf7b99adcea7214bb3fcb4dbb95ba7574113ccf
-
Filesize
7KB
MD5ca9bf231ce3ebea7c1b61023fa432e61
SHA158734bc50caca0226b96c224263fb81a6bca9fed
SHA2566be46675b0a5093b32fcbb33135af33e9ffe54a41839a4fba9c0a99f3a24b36a
SHA51286723fda5996337a97ac73e1af9aafb0d736815becd78b923f16d7352095706b3d0f3dc6c520de5070e383a219f0840f672cc4ebcbe46d02c713d90805728753
-
Filesize
6KB
MD5ad0dafd359c6aa8b47349acf75a0146b
SHA10e6f5e15758ab73c8643b0be61a932265601b3ca
SHA25621dfb05ff2574b1907093672a82011bedee7b6c400f48e81c3a0ecafe8b9a4db
SHA51274598b416a58edd01480b182a172073f8d23db23b0110a059ad495d4ee6d5c23cd2c7c0f202f5a5d6974c79b48d76ceb951ea9748574025e451b7d9126f85ee1
-
Filesize
7KB
MD584ff5a286c0f6b3b43f759b82ad7a3bf
SHA1a5ce6bc296f5ec73c4e26b32dda1028d48b4b914
SHA2561eb21c47168d23c6abcaa1ab3c7a6999240b95a6bf1cd927415131607cfae91b
SHA512e943e34e5572ff5ee1754e001979d2836ae7f9a29dd268e48d14de9137d02d94bdc31a253fecfa3db5ef1ddb81052b87a5f8e55eee4c1f399d493555f444216f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53eac436140b8ea9dad744145a1b9b4f2
SHA175b110793dbeed3ba19f4ade3b44caec876eec08
SHA256866615f671c9cc9ec7463f17975a83fe2f7f8040bdc1dc9d038b4f6a232c2b3e
SHA5126ee78a2216286287f4e3df36e8051eb36b84abc12f5270edb9d1615f6e8c17ad5ad354d6e401c42efe23640a24bda9cf1980fdf31b4f971954b0c297b81ed680