Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
0c36819369b949113ba7072c495a0b4d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c36819369b949113ba7072c495a0b4d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0c36819369b949113ba7072c495a0b4d_JaffaCakes118.html
-
Size
150KB
-
MD5
0c36819369b949113ba7072c495a0b4d
-
SHA1
236f78cf16e5ff2543afb093b4d87a94ad276226
-
SHA256
914527f1183abed0f7ec8dd7b39042ee02ab9a28a746ed7291ce25ccf6487194
-
SHA512
bc5e76581f2e5b2e4a14ee7b5aafee7f29990c7a961fab24f8feb43e27ab9fb2afe17e2d182c5cd74816e3dd83bc116df6f70d84a80163398355bc24edf74a42
-
SSDEEP
3072:sWheHuL8G/mHKnY/2a6+QUkaeQMrC+rNIHhw9UtZJie:dCWNIHh0UDJie
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 1672 msedge.exe 1672 msedge.exe 1740 identity_helper.exe 1740 identity_helper.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe 2116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 4424 1672 msedge.exe 82 PID 1672 wrote to memory of 4424 1672 msedge.exe 82 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 1468 1672 msedge.exe 83 PID 1672 wrote to memory of 4860 1672 msedge.exe 84 PID 1672 wrote to memory of 4860 1672 msedge.exe 84 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85 PID 1672 wrote to memory of 4772 1672 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0c36819369b949113ba7072c495a0b4d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8dff46f8,0x7ffe8dff4708,0x7ffe8dff47182⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1086056894760751982,5045433551759246450,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5a00eb36f240089a5bff103400638d6e9
SHA16850f754e302480e8448eb986ef7c1f90dcf1163
SHA256b9ca10a0ca348a9aaddb7e0c8ca8672b6c9b510e9d6857c6e3aefe9de1920513
SHA512df7c124551ef14a1bba5d05e817df36eaf328622d3984c18663bac0f3d7a8ea209220d32383a11a34097829c2db7dc21f22e926f0ec1fd92fcaafada76c4545e
-
Filesize
468B
MD5e55a6836d4fca20a8f03c4ff8cd8b22f
SHA11f2382d96274c98766443778f3a988362e34f3f7
SHA2560d8c56533b644c8758465a98cc047be8dae3eeb529003252afeb8e5678c96786
SHA512565a30c01fe6b918559e8e5b46b9716dc90298295a3b1b4b8ea63060d6319e6b92beb6363ad1e6ec6c6cbc71926ade96a73fab872d03a9232f1c57697027ec87
-
Filesize
5KB
MD5e937eb33ffb8f80e43fbd0a15a9e55ea
SHA18005f4442cf3c16c11086740bea3b06be248dd7d
SHA256eebc1dccbb804a6c6f98cdf3a72efbf3975016448d49c79653cc3eea26b2d95f
SHA5123b16644bd242ae45b0c822bca49530f29cad17f62dae0d155031893f04da6e082cac525a2e201ba3d02e47c86f7ae40d1477f348eadac81da2bfdf8be1ca177f
-
Filesize
6KB
MD523c06467ad70ef9f68c4969d0e5f2d4a
SHA1f947986b180c798d723fb1c14025cb59d1324804
SHA256e044c3f9b6e7342f9319ac328b639ffa82cf961023502b6c26d72eda0f085e69
SHA512f2f7bd9464ad843e813c12a118a08875635cc39a9592dddc092dac2056dc203c7c25e22e8bc385c9bbfb199f88ec9bfc0097f960fe6c200f85345630f8e38161
-
Filesize
6KB
MD534e3af8ba66ab22faaaf782523bfd352
SHA1ba3453b7ff41ac85fa98889398f906791f7967c0
SHA256342ae2c4f984320a6f91b80caad5aff0a3b40f5dba1f727485ee217aba2b271e
SHA512e2ec1c16df5f129ab9effd51da9937858c3f8e65f00c8234b2be34c7085a632dda9125071d104809e40b984c27b34af7ab5cbe178afa16699a7dc89c64bd7e2e
-
Filesize
6KB
MD5eb08be8838859a52826e60162b1fb828
SHA159fa9688e5f679ffa371a0231f4aaede753b356d
SHA256b53ef0bd971f64b6e7cca3648155de66c6d4cb28d34379fe82249fbc16148e95
SHA51260236abe6e584c6716ad40bff5bd9481f117a6b4ade8099aacb7d32e2762295cc01b520480d10b9813f87b351df63730d9753e470aef5b6e43624593488415e4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5afd4c216f1f22a6cb47746463c1c8ae2
SHA12740f32d0bf864f81aab3c296eee46b32f1aebb1
SHA2568aab7af2e0af433478c7a3dd35a067f0413f20e2b10d5a27e65e80f0046d9f37
SHA512abb7ecf8a4749f517b2759d1b25831acea17e5071f9cf7a8671eb3cffd8f0f9b7b8c82412f9ed36b8dfe80bbfe03c5f6b3c383835bc67d495130006ed1672bbf