Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
a67f732e4645be93e72d8b30b8a06359_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a67f732e4645be93e72d8b30b8a06359_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a67f732e4645be93e72d8b30b8a06359_JaffaCakes118.html
-
Size
20KB
-
MD5
a67f732e4645be93e72d8b30b8a06359
-
SHA1
d4f74ce9845fe4ceffed5fd2ebdab6be56e9a0de
-
SHA256
f0f6b3a268ea9a7b0331deb65c40a989348bcc12e5cb5c70ccd7184af2b3f18d
-
SHA512
e18013b9188dd9c28cc4b028c08dc03ed64fda2b358807828a5c32d9d1749ce7dcacbe2d2f6e0d23b6f1ec43d7484e65afca492fcde9c0d76d100e49fb22fd0c
-
SSDEEP
384:D6uZTZwZBMuBMPBMaBMEiq6cig2sKRbik55RrWg6wXeb:D6vCuCPCaCEiqxiQ4bqgZeb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 2872 msedge.exe 2872 msedge.exe 532 identity_helper.exe 532 identity_helper.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 4380 2872 msedge.exe 81 PID 2872 wrote to memory of 4380 2872 msedge.exe 81 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 2912 2872 msedge.exe 83 PID 2872 wrote to memory of 1736 2872 msedge.exe 84 PID 2872 wrote to memory of 1736 2872 msedge.exe 84 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85 PID 2872 wrote to memory of 1512 2872 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a67f732e4645be93e72d8b30b8a06359_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa40d346f8,0x7ffa40d34708,0x7ffa40d347182⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3004090024795776525,18062815498384155071,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52806fe5d370d5ade7c81c9abf1a37ba4
SHA1a8ac78452732318df9d74dce6a508030df50a16b
SHA2567e663afd3e05584e12a4554ac5210669c7949682a0bca23eba5f20524697bfb5
SHA5122f8f48642e9bfec847c881cf696ff9cc44d8421d8fb03b66c507fdafd783962d44eb873da33175cf186550237ec4f629cc06ed889bcd7c9b745a1d83e4a02dc9
-
Filesize
541B
MD57081bafc170425f33691659cbdab3456
SHA163e1d2203d5b7d6156d5e3d77965b20d240c9dcc
SHA256c6d8e60bc36fdc1678cd26c363b8a5fa346544542af01623f1cdd35147f91df7
SHA512a974a4b473e4c6e99cdfbd75de8d5f6e985a555083a3a661db2478e609d1c16d5d43ae9ce3b47829912aadc8689dace35d8e1cd15e52d8e796b6e2bd91d13aad
-
Filesize
6KB
MD54601854a94f3d01e21760c50ba756402
SHA1a096c7a2694b4e8cfb7d1ead034da1eb3e4b95b0
SHA25641ecf8ce5dfad988e19d5753536b1653ddcab5b01e6eaaa4582015757e734560
SHA5126f2c76a030b420406e43e6ef36a8412f705c12f242cc9581c8ac39e44c6d5af1080909e6534c610c36df08dec2140dca656687790484b8b73745122edc91dd05
-
Filesize
6KB
MD565ad17df3246f09084c9d48504d7a329
SHA1a4f405ac095c23af486d9323a2e05306f93c023e
SHA2566a7101233fe3fb42111409d774715ad27606f597e5b49638f4e99010f85df416
SHA5121dd1b744244ef2d54b98dfff469705929091dc74537a76995f4831f3384ca4bc485895c56bc9e4c3e8b1e09e9a03ccf407dd84cc9b318788b56777c0be73c32a
-
Filesize
540B
MD5dbcd064bacc89c21838692fe1db28135
SHA11a77e2583e3954cee65d602624c6b37fb41b1a76
SHA256ef6ebb2ed4bbe874d1a958a67938ee2cfe225a92eb2939f12061f1eecb627082
SHA512d339387fc5f57af5639d31c57e8b79385e031fc76f5b78ec8acc02f48c4939bf1aa159c155e82e10bcdfa604c1371c9b80f426295434ec32ccd16b4b2e59953b
-
Filesize
540B
MD509129a57d25cacc5450332d4d8086f8c
SHA1d75a3305a4f76db94a59af691cbf9f6dd566c6f1
SHA256676f104c934ba61fa8c916eb68abfed0a175d18cd57d581af12f0e8cd772d6e6
SHA51251bd6454be23cfb3ddc6c7dc4999d9ac0809887d317a971da76ae0fd5f5e13c5d901d134b43871678ca22ea563091fa8e7a9cef5a899dbfb5cb627076a396ba4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58eed5c5b80f410ad0be1b2eec7d6f4d6
SHA174419d010dff85d44b8e937738c4c8211f1ce838
SHA25605416a13a90683e271e7e687c44f76ca9cb6823ebd6ab9424530cb6c0a253eef
SHA5120e6d1f69e0d47e9cb4a28d46faaabb521ad25d6b79f29dd1f8e3ab3bd8aa1f9abe277aa3b4e42001d57cf6a2157f2615c221f7dc29a54223180709c5ed53d765