Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
276e7eb51c47bebcd79a62531445d1eb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
276e7eb51c47bebcd79a62531445d1eb_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
276e7eb51c47bebcd79a62531445d1eb_JaffaCakes118.html
-
Size
56KB
-
MD5
276e7eb51c47bebcd79a62531445d1eb
-
SHA1
a50269f6dc3b59c7ffa4410aaaa9269d5d31e1f7
-
SHA256
3c7cfbb15e40c28632c89074429cff460d9ee8c204a18b094795abe1281b847e
-
SHA512
f7cbc7eec47471aad2eb159334d6411c847459e9745f47a28ae5b98962a8e4e8d9e5681eab3cf598d525681fae11d78cec3cde9789daa498a5a531ce34408b95
-
SSDEEP
768:9rdpHvvCIoo1S7aydwGpuviCoSJIP5ypt0UfLtqS/Zsphnp:9LHv7oSS7ldXoviCSP5ytDDZsp3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 604 msedge.exe 604 msedge.exe 1504 msedge.exe 1504 msedge.exe 4676 identity_helper.exe 4676 identity_helper.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe 4272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 3984 1504 msedge.exe 82 PID 1504 wrote to memory of 3984 1504 msedge.exe 82 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 636 1504 msedge.exe 83 PID 1504 wrote to memory of 604 1504 msedge.exe 84 PID 1504 wrote to memory of 604 1504 msedge.exe 84 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85 PID 1504 wrote to memory of 1520 1504 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\276e7eb51c47bebcd79a62531445d1eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9004a46f8,0x7ff9004a4708,0x7ff9004a47182⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4592244624189621850,8960389464703905127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fbc957a83b42f65c351e04ce810c1c11
SHA178dcdf88beec5a9c112c145f239aefb1203d55ad
SHA2567bb59b74f42792a15762a77ca69f52bf5cc4506261a67f78cd673a2d398e6128
SHA512efad54eb0bd521c30bc4a96b9d4cb474c4ca42b4c108e08983a60c880817f61bc19d97538cc09a54b2db95ab9c8996f790672e19fb3851a5d93f174acdfac0ce
-
Filesize
152B
MD55b6ff6669a863812dff3a9e76cb311e4
SHA1355f7587ad1759634a95ae191b48b8dbaa2f1631
SHA256c7fb7eea8bea4488bd4605df51aa560c0e1b11660e9228863eb4ad1be0a07906
SHA512d153b1412fadda28c0582984e135b819ba330e01d3299bb4887062ffd6d3303da4f2c4b64a3de277773f4756da361e7bc5885c226ae2a5cfdd16ee60512e2e5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5853a417c61b6147650318ff7e01f85b2
SHA18c1de366634ef74a0b0bfd1dc684ed0f16123ccc
SHA2563c909d23f07fa350bda0f2531c9f1f9926898193d1b95238220b7950cbb65dae
SHA51258e9cfa833122872f039f73e9f8ed6c43685f207373d9610985af85cfbf788eda210dc27420794bf1bd19438d86c6d767eeea7550bc88efeddd7b2ff8f7ec297
-
Filesize
1KB
MD521ef15c31d1cab270249d4f6b0a81489
SHA1dfa82e3e24e6761ce6d393a0f21f80b827f252e0
SHA256cc2397f323ef0ae164e29043256f4c91601780e8e9a88af4682da50c64049f7e
SHA51275266ca461f4819b0d8ebaa0f5f0f3d9540e1078122626e08a871bdf204b0b12eb0318f8a0594d96c709785d94994e9dc910595f5afbbb34ea58efb49dc3791b
-
Filesize
6KB
MD594dcc8d41ce72e61baa2c5240182acf9
SHA1a56add0aceda0a23a6c8d8ad02dfc2fdce08bfd7
SHA256490faff5a71444b64ceb4adef08cf3df5d107e48e9efa411530aecc4d4663823
SHA5129cd9cab469d3a52516cfb0042dd5d650f7b261c80f8c67ef8249495738a9de8823de0c4fe9e24acbf38aa51158f1f6cde78635972a22b1df7dd73ee0c4649afa
-
Filesize
6KB
MD54d61bda29a30598e2805bd1f7cec586a
SHA174709d574fc21c8937cf73e7f434073d99cce1d5
SHA2568472e4a211431e888851b900bb8bd6752b4f2dbf7d441d801260416d6670d8d3
SHA512e56a9b7bb16a547d821cb5264340e866b541b574b8fd1d4b8856e620eaf6aefb9544c046b6f16a099206b621f3206201fc332f17b2eb44e2e6362dcd30c6748f
-
Filesize
6KB
MD504e377b8c5d141cce39988b67ed6b1ca
SHA1ffc5ce930a78d8ec2ce8386ca9aaad6172498127
SHA256ea78359e8fbcb7d9ab092eddbd1bb6473b7a80f002b840f4fc308abc19a3535d
SHA5125b6f0c86928298103a044b21bed82c0d27631d1ea10f732916bbb89fdd452657244e11f1a3883bf76505787e4bb50360860e4e7e8a6a820c2ec736e85549bac1
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD53bf1d9b18db70a5374b4306f307e8c03
SHA175927a61edf6b321d3ff8bbb10deca25c3ff8376
SHA25678c4b1f5884d539a631fff999865f5f60383e7aa1755ce018a8ff561c4a0540a
SHA512db28e15d503e69fc6a67865c906f450fd7a36bb6f98c0b3c9c6ce80c3885f9ea6b8562f9a21f88927becc5617e60a961c615892999b539f9e150a21333979604