Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
234280b79cc09aaa05de48c6b5b8a60d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
234280b79cc09aaa05de48c6b5b8a60d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
234280b79cc09aaa05de48c6b5b8a60d_JaffaCakes118.html
-
Size
19KB
-
MD5
234280b79cc09aaa05de48c6b5b8a60d
-
SHA1
fb13f84217e54931d1531486ba403940a82d6e97
-
SHA256
c4c5f4d2570271ba3181397db505a1d7b3a15f00ef15e599403f0eeb3dd1d00c
-
SHA512
e718efacad19f1fb3aef7b22b3e172562ce05434832b372ef12c5f2373e08ea80adbf17907046524279e6c70b08cad37cc42e42f0d57f809d0922d238a8f281d
-
SSDEEP
384:4+QfPFd9QZBC7mOdMMytKfpC5IgSnbmFe7AceL6ViLAPd:Zcd9QZBC7mOdMMXpC5I9nC4lPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 1328 msedge.exe 1328 msedge.exe 216 identity_helper.exe 216 identity_helper.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 5080 1328 msedge.exe 81 PID 1328 wrote to memory of 5080 1328 msedge.exe 81 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 2820 1328 msedge.exe 82 PID 1328 wrote to memory of 4700 1328 msedge.exe 83 PID 1328 wrote to memory of 4700 1328 msedge.exe 83 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84 PID 1328 wrote to memory of 4616 1328 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\234280b79cc09aaa05de48c6b5b8a60d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e7e846f8,0x7ff8e7e84708,0x7ff8e7e847182⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4588 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6595650127070797095,2293828439211296512,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4588 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5859d1e59deb18ce0a4e8e76ffd0de593
SHA18e7a92821c765a8f826fd7711190e64aaa3fca3d
SHA25618a2d09bd51ccb02c29550d768ca132862f232db4b656ee54a7645f23ba0c9db
SHA5120807169d9906ed84c5ad59e58866254afa963009b67ae9d38d725c0d2fa4f1c65dd41bf8a64b17e196856fe51fc7ef1cf70633da7c6db3a1b5577b2f3a20ef48
-
Filesize
1KB
MD598714585c5f7e722d6b8884eac0519a5
SHA11bee2d2886c258ed0c338640c52dd18c99b12c58
SHA256d84f28aa868754c3ec59f89f8add2c78fd76dd615624873201efbcbed70d19c7
SHA512a27fd6352af12bd12f0cf2cbb98c1e430675d2476d05b8311ddd707d80f553d28cc9c20e84641e9f3fe97b437bdecccbb1b45aab25d2955c8bdc88c24269e89d
-
Filesize
5KB
MD560150d7fb5b5311408cb8a7c075db8e2
SHA1798e86c6b0239e9db0b0c0bb09531de0aeac4a88
SHA25621012e594d43e38ebdc04a706a76c04ef68eca4cf93e0c6ec6ac357e37b30a24
SHA512d7bf6254b60dccf4cb7940361247451c759a7a774fbe91ca5e120e8ecd32947e323f7289a8532f5a580cb9fc5067bd32a0f0c2b7c717830d7685680dd3ff8285
-
Filesize
6KB
MD5df6e802f8ac7b572b1938abb40f2ee1f
SHA194ffd4874d78f03c1a2da684eb47d5f8658170d4
SHA25690ee0425418993433c960ae1390a9c50c8280f399a1d98e28259288ff1fb9ca6
SHA512fea2ec96fa9a24c984513bf53c8e426a64bd1349340e972f31d98009e2533c56330dac0e5abea713c52d1737d8e0031130589a6402fe60454ad14f541bd21294
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56a04ce6eb64ddcf2696aec684ed708b1
SHA1f9aa095b19065f90346cc49fefb52e472bcac7b0
SHA25685817f952067bcd1535dc6d1d739a603af6021a6bc4ff1071304f7dd3263563c
SHA512f2d317c40cbd21696ef35e52c40df1cea652d2eba4a0d25a76fe59574f680029191706055864035e3b833709fc8f4e9d7de82a1a9d9916af9927b1b892309c96