Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
99c9ee6ad68a074e67cfc9a7f3dfa53b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
99c9ee6ad68a074e67cfc9a7f3dfa53b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
99c9ee6ad68a074e67cfc9a7f3dfa53b_JaffaCakes118.html
-
Size
66KB
-
MD5
99c9ee6ad68a074e67cfc9a7f3dfa53b
-
SHA1
9f6f888ffcefc2e171acef5e20fe4d84aabf5978
-
SHA256
7311b350437d5db1b5bcee4bbe632808002322224f8cbcefd0c1746663418b8b
-
SHA512
6d8973aaaaaa38a3486ca860eec5013d703a3ddbcea504cfdf012bbf05fcf0e2f9dd814e48c908d5b20720ab2eb1083a6f60c25b25c3bb2ba14e902877552ff5
-
SSDEEP
768:JiYgcM0St8tN99OIsb67u6cMoTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/Ijh:Jk+ZZcBTIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3160 msedge.exe 3160 msedge.exe 3728 identity_helper.exe 3728 identity_helper.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe 3160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3160 wrote to memory of 4744 3160 msedge.exe 83 PID 3160 wrote to memory of 4744 3160 msedge.exe 83 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 380 3160 msedge.exe 84 PID 3160 wrote to memory of 3416 3160 msedge.exe 85 PID 3160 wrote to memory of 3416 3160 msedge.exe 85 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86 PID 3160 wrote to memory of 2348 3160 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\99c9ee6ad68a074e67cfc9a7f3dfa53b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fe9b46f8,0x7ff8fe9b4708,0x7ff8fe9b47182⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12860472157751277243,6737102598038771224,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5e62c770da13085858b1305df425bc43c
SHA17ada23424e888f2bc13af56558ffa9d1bbfcf400
SHA25663eac19ce8f8e33d4903e0943c85616d50e793f3c1d064653cb22d926879addf
SHA5124cb11b623c2adbf62a18b3dc0785da08e9337494d9eeaad62b4ddef84320b45dce7fa89ef5768d502cab4720580402f3cd0ffd6c65bb69cf4f1906d49e4dfaf7
-
Filesize
410B
MD5df075a8bddebc2f385b930186b065871
SHA152a0e9461679acd102a6f3c035efdaab0ee6cf30
SHA256db0041ff5629f40341945e5686a14944ecb9c8a6f088bf05132a40d91479c7be
SHA5122815df2fa82131903155d8ab9f0113321e4b25c73451939ed1609a795f729d53e95f36efa78ba4cb25357c027d5f13ff806d09d82b8a2e6f9fe0f41d2e8c90e0
-
Filesize
5KB
MD5370670f66914f7441d2def4ec7c437d4
SHA1ec97a72f2f6e0f7c3d0190da55f46fb2ffd6004f
SHA2568282846bb77a366f2db5b3e61374542c41dc86d7fa2fae3554bfb69a0ba6827d
SHA512ae1595590e66a4e4512d1d84d1857f038602b8a72a3bceeb15cc3bdebbc9f8f42048e791bd620a81c2c2e1524ef32dbc85e68abd468955ed41aeb31fb76a7b0a
-
Filesize
6KB
MD5e63314aa6ac128432475b1a7277c467b
SHA1c3704b7af75d308146548b9754984dbdfcbed37e
SHA256eed6cd232f9b1669f2a0f9b3875dff2e51c2b0b8f78df8224b4b8792ef94962c
SHA51276037216238ed58b608345d9583c0ba40e303e2e74ece835ee03f3cfccacd9d86a9f6ec2fcb875a7406a6d3b2781cbf86a1ced1fd047e5c57e8e970d0df86467
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD523eaed6f28ab1a56a0d5f25444ce9495
SHA1bf881245a0454d6b4a5f0a1a617e20874979ff54
SHA256157ce61cd8605ae621bb61842110fb9bde5aca298d3a9ae438460848ceb51c2e
SHA512e16ef930a7364a92a9ad5250dd1d1d2c14c7ebe021e126f87c4c737df44709417f70cfbbab96a4f6dfcf812aa9a5cf2f05d7245409353e881f9255f592d14d29