Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
283a0de87db0556ddda61efeed756142_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
283a0de87db0556ddda61efeed756142_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
283a0de87db0556ddda61efeed756142_JaffaCakes118.html
-
Size
17KB
-
MD5
283a0de87db0556ddda61efeed756142
-
SHA1
3664e0c1fedf13b57bb75573095e6e193d1836a5
-
SHA256
c879b9e67967f60ca4e583909f997be191a3d1c1ddd8cfc34f781e435a9354af
-
SHA512
80d44e24ab43d2e6cacd22d1fbcd6096d4a1a7227385854ae07a588da25d609c75db8342e1698b775179ffd55a68a221cd3e8f89782b14f22e5dbbf0a3751115
-
SSDEEP
192:rEadhG5jc3zgJiT2uI8IHcf2u9jzqClNok5TOCTEi9Sm23BnDES38xIeExUXzj+8:f+cy8kcekjzvokgCT/wBnDErvjNB2dJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 3588 msedge.exe 3588 msedge.exe 3260 identity_helper.exe 3260 identity_helper.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1720 3588 msedge.exe 82 PID 3588 wrote to memory of 1720 3588 msedge.exe 82 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 3180 3588 msedge.exe 83 PID 3588 wrote to memory of 1984 3588 msedge.exe 84 PID 3588 wrote to memory of 1984 3588 msedge.exe 84 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85 PID 3588 wrote to memory of 1436 3588 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\283a0de87db0556ddda61efeed756142_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0c2746f8,0x7ffd0c274708,0x7ffd0c2747182⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6292 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2256,2207229873748456611,8365037616600944060,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD591a88c17e876c37de5fe72a30cc153ed
SHA1d6e75b501eb2ded39095731a47e3c39646243205
SHA2562403387f90a4f7c25858c2b785682317c302f7ae4850b46bdc421ef24b4e1070
SHA512f430d03855f4b0d6e693a2fb816186bcdaaa4441ef842f944cb09c45dbba7ea118fc9f4239bf7553a80894a84a287631f71bda5c0a71426a0a348bfc15598efb
-
Filesize
1KB
MD544769536764ba78407660bff2b1f5701
SHA142d587e6f0e9c6b1dc29c5ea6a852a789625c7ee
SHA256df68c32b5bdb6c86159efc65a25d496cd1aa3c717e1a4c3cdc2a3d826a395746
SHA51276e38ce5c3c81f07004534cf12f88aca9dd921df82e3a5989ffb12512527d01c2d7658898abde083819d4acb62aad54ed66395d2360cdb97594017e5e73a504e
-
Filesize
6KB
MD56672ad212dbc69c7a279bcdfe3f08e89
SHA13a5502565ca6702e51c1b93bf14562ef9030012a
SHA256cd2386026a28b67487e9d6cce72a04bd94c17d56c173cd6b29ee3f15a9dd18f4
SHA51227060ad8524cd4fd4fa9a5dc7885e2b276b5fb0013ece21d393c493dc4f8d35bda278b32e076900132fd2f3b8659395e44d89b7c572c84c6725b5322f088d02d
-
Filesize
6KB
MD50eb24376744f23af1e62657cdddab22d
SHA1d70f752a45a6bfd4526642056887cdad77929d84
SHA256a1c3e98d72832d7d3b190d7043b766f38880bac7327bb62d285de98442a9644a
SHA512f1aaf2e75230c14bc04ecd7358adabc30bdad9d28cb37ecc7f7c6ec759d769fc3dd436e96f51913a588c29da6f8dfaf1a1bccf412af6d0b6059cd2952b2497be
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD537e1929aabba3733ddb565360ccadee3
SHA123b036519231da037fde5685d171f690a065eb95
SHA25662d22ea48e051518ac3a27429660404fe8d2a386bb37f8a6f037e6cc3bcaf4ac
SHA51290973d11ee526682284fad9b5a038004735f6db8239bce18af0f10bab01daaf5ee7cbdd86c42643f0cce00a935eb8423f62c33e844114d31dacbb1f9450e96e6