Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
288e8c6a613b96d2a85a7a6c1cd8077e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
288e8c6a613b96d2a85a7a6c1cd8077e_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
288e8c6a613b96d2a85a7a6c1cd8077e_JaffaCakes118.html
-
Size
81KB
-
MD5
288e8c6a613b96d2a85a7a6c1cd8077e
-
SHA1
c6d4ccc2ccc1720cf788676896a1cd8d74a529ab
-
SHA256
15ab3cb8806b029f640bab4ad59f12c3a5d1a79d2824d7734e4ae055024669fa
-
SHA512
4fcfce552220904f28a6893f7bf1c3b9c4f1f9240d888549937bf2f09135daeea2988ee53621931da5b0440b79520152294db3659fa871626330e40c463c1c4b
-
SSDEEP
1536:f8OrV46BnMCgIDiToOeWT3ZLPccaw6E6dDk+Uevc1sVIWlonFnZspee2u6fq9kH3:eJeWTJptyyOs5jQz8nxQdm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1548 msedge.exe 1548 msedge.exe 3196 msedge.exe 3196 msedge.exe 4940 identity_helper.exe 4940 identity_helper.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 804 3196 msedge.exe 82 PID 3196 wrote to memory of 804 3196 msedge.exe 82 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 3264 3196 msedge.exe 84 PID 3196 wrote to memory of 1548 3196 msedge.exe 85 PID 3196 wrote to memory of 1548 3196 msedge.exe 85 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86 PID 3196 wrote to memory of 1560 3196 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\288e8c6a613b96d2a85a7a6c1cd8077e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc96fd46f8,0x7ffc96fd4708,0x7ffc96fd47182⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8662686087322682953,15780740775624559129,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5c90fffb18ff102356cc430efcc4c70ae
SHA18c12b5538f58c8f997d94383111fe99dddad73e2
SHA2560a84191ef1a39a5d6a05d718c87e8d25d6db3e155b4de0b3aaf43a3894a86608
SHA5120ffb2186e8f88d3de1b78de4aeb36e09e017ca36a2e100dd192810394695e4366f91aa935b7700a0a1874e57df6c9d14b257e24344eca2d7e174fb9f2f47088f
-
Filesize
1KB
MD58d5c6521b3e5a9f00acf8d8abe6488b8
SHA171e2e135b7f1f7ad17b29d5ad788fe0da2a39cac
SHA25691c77c0e7ce77958e0a100825c4bf89823e4a297afd95062e235318f2e71bded
SHA512894554547a86629733b14fc9480846953f0c8f3ea685f6bba50c5b92579d5f2789d8bcc51b7098d4d429c6bc0572fc35e4da490aea50dd5bef430da9caf3dfa9
-
Filesize
1KB
MD52a24c13a368b59fdc199fb994b1c495d
SHA1e5e6d44238587a0e76c872ed37c959c214564ac2
SHA256ace6430ae133a22d979c44f51d6cb35a242be89ca9e4e005fcd57269eb49c005
SHA512ef7c5434878b22e8c254bfd9ed24b6943c9e09e037b1760bf1b044346859e712799f9b6d2055e65b746a7a4925482db2aca0505832a40b3371f42d0bc01a33d9
-
Filesize
6KB
MD549a7dc65780617a8844ba0227390d019
SHA1bc667402ce26de498cc3ff32372494669a62b001
SHA256fd173878c184c6ea591eef453dbffa185e3ad2c278ca81e766c975c7d375cb06
SHA512d1fb5ad16f818bb1f9ce8cb2e0dd10caf68c860d9ed532fc05d7169ba438e88f649e22a908a24c1b002776dd1c323aa116d47caea9bb155f06ebe042cfc5a1f6
-
Filesize
6KB
MD51d81a1aae7bd90ec4d5dea1b476c5754
SHA1f8cb70554f2562ca650aa34c372546111351d1bb
SHA256c78b0bec9f55b33b8e832b2c7aa3454cbb6d5a49b86907aa430fb993ca617886
SHA51204c3f0e56c494456acc636855c5a6525253b4146221a3778e02912d7c422cbfff4f9925530219319e405e8199696bc0355b26ac8c76203059146105bf44d2376
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD531902cffaf24b285d830d36f6cf6b64c
SHA1983c9244892c437c0482d6a1b8a9e8e57bdbcd83
SHA2561d85d6fd0b59fc9704014d287d5144732181e881bdb62f46662b4db4f0c378fa
SHA51240972d0073ba55dcf5f71b25bc6229432e5f554792663f1d10b5198fd43f04bc40fcb9a87d0103d7314727ee626fd3f6916b661689f33136fef7d796a519476a