Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 07:23
Static task
static1
Behavioral task
behavioral1
Sample
b75e5f553a5eb1a45d9b6b05c4a508ba_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b75e5f553a5eb1a45d9b6b05c4a508ba_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b75e5f553a5eb1a45d9b6b05c4a508ba_JaffaCakes118.html
-
Size
175KB
-
MD5
b75e5f553a5eb1a45d9b6b05c4a508ba
-
SHA1
7946324278ee489b28f993cbf4d5f2683aaf8732
-
SHA256
b93fee274e102bd7992dc68e48a0a78a08f6fc79bbe44f5811251d2b2188b4d7
-
SHA512
17352cb7a63463d68ebd281a40f85b7e043b7afbca62dc1e9ba5d6012d17da4df7fe0fa06c31237ecf8bed2afd402c1408b5dab045ec35a2e7b89f3cac9f8922
-
SSDEEP
1536:SqtK8hd8Wu8pI8Cd8hd8dQg0H//3oS3WGNkFtYfBCJisD+aeTH+WK/Lf1/hmnVSV:SpoT3W/FoBCJirm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 720 msedge.exe 720 msedge.exe 732 identity_helper.exe 732 identity_helper.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe 720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 720 wrote to memory of 2316 720 msedge.exe 82 PID 720 wrote to memory of 2316 720 msedge.exe 82 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 232 720 msedge.exe 83 PID 720 wrote to memory of 5092 720 msedge.exe 84 PID 720 wrote to memory of 5092 720 msedge.exe 84 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85 PID 720 wrote to memory of 1656 720 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b75e5f553a5eb1a45d9b6b05c4a508ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4fb446f8,0x7ffd4fb44708,0x7ffd4fb447182⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,10191493289060184958,14547911680874427531,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0f27a51b-1c6d-42a1-88e0-d9a08ff58af3.tmp
Filesize6KB
MD5ffb148483b4558a847848774411b3d37
SHA119cca4d97dbfedc27eb9d3c0531010c38e8e5f50
SHA2560551331d32402377eb0e6d0fbf020fc11e59e7f8a8e6b759683451418b83737f
SHA512450b99083654b7ea9633a559a217605d2df4e7fc26d5fa206270ffaab92656e1a89a199d1b0abcd49913160d3de071bd82f884a088477e2d8f6b29496d197356
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\186b7425-79b5-41f0-a238-42001957d6a0.tmp
Filesize2KB
MD58cf28e1088622d7dde768cca4ad9ae20
SHA16bcf0c1e037d3906c28c09faf462d5cfe42d09b9
SHA256377e1ed2b52f9c2af413586dc5121d39ccd8b2c46d73402f589e2dc889e68ec6
SHA5125c0a81730d21610955ae3e2fc6e9d033523a2181b548d84fda16ab1be2c055ee29b42d0de6e9504573ec9159a40a5e1f07355ab7095c59a34a6c0103714acd77
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5be3cbe1ccbdc48f856824784a784178a
SHA19ac8debee73e6d62f9a1830789e9e55602d8f747
SHA256c6a52f7afd2fefaa8dcb2461f14eed374eda7b867c7c85b161c80cb1a844cd91
SHA512f42f6fb1b79cdd634b134977c294400d87afc3fcdddff896bc38767221f4e23377488dbcebc1ede8a222352b4498849bf95826d55eaf1fe64d8d00097d34fe99
-
Filesize
2KB
MD523ef733c03f00f51df14ef71818bfadd
SHA10060173c349d1b31bf9a0e32848ae630a36c3a1f
SHA2561602eb3adf7d02a7871190dad857393ab9e451f72d5eb2b85a790c0c7b509509
SHA512625b89452f3971797c97183af48908907cb301ffdb5fa165081277615e7eeec3abc318886f3327d1b718191bfcc7286327f4a44f37e51cf66f3b1771e7f533b9
-
Filesize
7KB
MD575d579da0f761d7e6fa70491e77a2e5f
SHA13a58c4c6099706e6d3d843f42039c363aa7bea4d
SHA2563880765702b9e8b59d4c49c1489f319e2d174abae7d32f8df8dadb6e92a18fe7
SHA5120c0dec89b64f3392ee5c98e99156383d864eb665c54da11dbbdcd160b54ed84ae3f654076e784ab45d4eb83c29ee28c096a558713d68343e75a3d99f7c667916
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD584cc0e6dffe1ccb9efb1593f2f9e2ce4
SHA105ce404f101a3bd7e189bead369925151f5f06fa
SHA256bc24223a79abf3aadce70820ac9e821046a6413d6638f65fb7065283e04a1d62
SHA512cffaf013a6d0098dad43d4a8a140420da9e8bce8775c7065a6f0207ff3ee03dc53df9bf36b98da3d09db463b2924108c91f47503faa3f605ab32064ddd2e48a2