Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
299f45895d1fbf0a486a5c258fd2c445_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
299f45895d1fbf0a486a5c258fd2c445_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
299f45895d1fbf0a486a5c258fd2c445_JaffaCakes118.html
-
Size
19KB
-
MD5
299f45895d1fbf0a486a5c258fd2c445
-
SHA1
983aa2884dbddef3faac86cf44da087b56697db9
-
SHA256
2e88354030bb3214f56138396454ff648ea09a035c5984176e5ae59c79c02e69
-
SHA512
560bd090bf8df56cd427fbbdaa87513aa1ea93bcf1d1ce2dc9651d360b806fcf32e5a5800a8ad297e2b6810d31037070390034831104ad524722fa215d4b5693
-
SSDEEP
384:4+QfPFd9QZBC7mOdMQYtKfpC5IgSnbmFe7AcvK6G3LAPd:Zcd9QZBC7mOdMQhpC5I9nC4nPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4544 msedge.exe 4544 msedge.exe 3412 identity_helper.exe 3412 identity_helper.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe 1932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 3864 4544 msedge.exe 82 PID 4544 wrote to memory of 3864 4544 msedge.exe 82 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 2828 4544 msedge.exe 84 PID 4544 wrote to memory of 4608 4544 msedge.exe 85 PID 4544 wrote to memory of 4608 4544 msedge.exe 85 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86 PID 4544 wrote to memory of 3088 4544 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\299f45895d1fbf0a486a5c258fd2c445_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc280d46f8,0x7ffc280d4708,0x7ffc280d47182⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:82⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6120 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17672626958207964818,7619934559332048853,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f0f818d52a59eb6cf9c4dd2a1c844df9
SHA126afc4b28c0287274624690bd5bd4786cfe11d16
SHA25658c0beea55fecbeded2d2c593473149214df818be1e4e4a28c97171dc8179d61
SHA5127e8a1d3a6c8c9b0f1ac497e509e9edbe9e121df1df0147ce4421b8cf526ad238bd146868e177f9ce02e2d8f99cf7bb9ce7db4a582d487bbc921945211a977509
-
Filesize
152B
MD50331fa75ac7846bafcf885ea76d47447
SHA15a141ffda430e091153fefc4aa36317422ba28ae
SHA25664b4b2e791644fc04f164ecd13b8b9a3e62669896fb7907bf0a072bbeebaf74a
SHA512f8b960d38d73cf29ce17ea409ef6830cae99d7deafaf2ff59f8347120d81925ff16e38faaa0f7f4c39936472d05d1d131df2a8a383351f138c38afb21c1a60e2
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD59780a57c4ae757789bcdc8908d1de43a
SHA19f96b1807d8c5ba2c898b2648378bc5d820e4888
SHA256f6f5c2101c2af8101509b8f3c27b9da9587b6a6724cdbc6158f2a083b2ca8e82
SHA512abe8c1d8cd952b1c0b636dcf1cf5523606837b4895bb022433db2c5a75b1d4f1bce478239c63b9ea917460512766834911f22b6937009749e7d1fa0e66c7163b
-
Filesize
1KB
MD56e5532db2c8fae36845d366a1f89bcab
SHA1af4788e5a2639e116288f3a5f5e2bf2ad464b06e
SHA256ad93530d84e0015e6ad7085852b7908b343ee919f0a1b9200154022a33bbefd3
SHA512ab090333a04dc67090b10abc6e4a55078e4d272bff2bbdcefd726c09ba38061980e15f8a5fbfee084c9f6a7de300655c86a46bbec788247ea86279e2b638c456
-
Filesize
6KB
MD563258ec30cb290c6466f27a6dba704cb
SHA11b4119c04181893e8c80f857bcedde6bd785251f
SHA256e8ff3a234ba77b5cbfc59a0aa60e4e64b98ae93fe1f329f0828c4e50e4a406b4
SHA5120c4a6dd8c9c7ade0b0175c78f3f07dbf0868901e5410d3fcff73f9bd104c563ffe2d83e78ce50a65a806a7ac518bb1638d942e41bcafa0506f0020d998eb3cc1
-
Filesize
6KB
MD5206c0507e1f44cc09eb9691fa131ba2b
SHA1dc1d0f9a059feec19841e882bffdaee81c8fbea7
SHA256981d60a5af0cb5701e6753b36a75f2139d99599a02d6c845f9e63ed58e462fb8
SHA512787c289b482180e03aa137563c91d2fe5bc2d9daed24d9f47c4967b2c2b43c181cda714a80d10b63a00a237d354ed4fedc5f6fad706a8c118d7abc8d92d91b97
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5446cc8975b13fedd3b6c495d020e3004
SHA1e23e842e5684be6297d0750f3c3406621eaef6b7
SHA256e183c7a9e5a764ceb5c25b2fc57f9789b20066305cd516df9889ee8063ae858e
SHA512bf824d58db2d0e031463cab135b7c114c6ed39b6cf13a3f5e6f5c88bffbf12c6cba2477c0e55bdaaae8ac0ecf24b2281e317596de4fdaceab17ae2907155d516