Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
16c2f6d6f0716fb511b0a2c0b90efcc7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
16c2f6d6f0716fb511b0a2c0b90efcc7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
16c2f6d6f0716fb511b0a2c0b90efcc7_JaffaCakes118.html
-
Size
34KB
-
MD5
16c2f6d6f0716fb511b0a2c0b90efcc7
-
SHA1
f56c9d0a07a07a4c2fae5765f9318cb79d05b475
-
SHA256
a0750e91cb245abfaf72349eb554ae1b978e70461d57dbd0f7bcc64e50755b40
-
SHA512
cebc18b6d1b798dac0c25965cbe2a7f4b94a4f4a08bf2f050b888e71a2961fe55929e8b5861dfb2a316a7e4e2aaf280addbd4ee4291d959778f43b63d33a648c
-
SSDEEP
768:SU6RwZcDZuX8UsCdW9pGH1dALqHHBFO7Hs2hRE9V5eR229Vi:QDpFWnBFOI2hKZeRM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4544 msedge.exe 4544 msedge.exe 908 identity_helper.exe 908 identity_helper.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe 4544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4544 wrote to memory of 3152 4544 msedge.exe 82 PID 4544 wrote to memory of 3152 4544 msedge.exe 82 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 5012 4544 msedge.exe 83 PID 4544 wrote to memory of 4400 4544 msedge.exe 84 PID 4544 wrote to memory of 4400 4544 msedge.exe 84 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85 PID 4544 wrote to memory of 4592 4544 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16c2f6d6f0716fb511b0a2c0b90efcc7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9c6946f8,0x7ffc9c694708,0x7ffc9c6947182⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,921741300807203487,15093729826529472249,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD528049b0d4e596aabbaf2a7db50d75bce
SHA104104029914f21824e08792005b9a3653647f3a4
SHA256c0a6e21109f79afad10d85c7aa5150944b0ff63088fc8e26e6ea67d8b6c21555
SHA512e044654b8388c811ae74bb0b1cca16f474f35e051c9758b1f5c1f9ba09e1cd1fa6971d7ce8ef6df7caaf9f267adf116b72ce574522452c15005f190f659c3a2e
-
Filesize
1KB
MD565f1552c5cecc010d7190d0d53510758
SHA1214948a093a037917c3556d15948115279748a33
SHA25636c79b600fb3ccf89b439c02f4fdb95c27c31965054f2e854081a5b158eed97a
SHA5124dd94cdccc216003e4e7d76c7f7096c35c4e2ea857490a5437d3a58be932514364615dab58818adf700210d44116aea0c37c227a51169f4003fe2df9adf50138
-
Filesize
6KB
MD5447e999b7e52481406ac931b30513b93
SHA1fcd2cfc2469ae72f6d56e56d143a87bcbfc406fc
SHA2564afc0399e3752298b72f9b0ebb41f50af6e62a32ee0bc24cffe8df162b61d8eb
SHA512d1a7bad8882df1406fdaf635be8d8c5620c93d7ac3c776c7b290f03214d9f13de7181dbfd93c3dc7c800bb2559eeda735a52a88d2fa543b90e862918492b8cdb
-
Filesize
5KB
MD5bd1f22f8e82e7b61a40ab0b942d23d56
SHA10c2f1dee9f2471e645059aebe10cdaa4450092b1
SHA2563da1a8c82ce2cf525ca99b88ead99d88bdc775a2139db1be14e1a9d9739dbeee
SHA512bbee121a9e654401dcb1d7cf7ba1cc6b8eff60ec3dcbbb8664e4a96ea3457d2529372ec89dff4df62b2447dc5a2a5b8e579a121a14aa49cc3c05aae79fbaca98
-
Filesize
6KB
MD506309fe22bd58b2a70e5fcc6c87e5995
SHA15aaacf2e39f3c6d68a8805f563cb0a182358517b
SHA256d7ceecdc6159de928faad60b2eadd972605050221b7b6560e44f21965af108e7
SHA512b4e63b07f4cf421e22f94f8ac20acf018716a836c81285a888483b765ec615c975401352b0d50165c003171bb44855d314cdbc099ac20c9885d56ec29e2a9a5b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bdb8a1f1f8063f8a67d461cf370c0395
SHA1a4399f4094644fd6d2540c2037ec37fff2a3bf2a
SHA2561f3c393f6cab5ccd5ff4c4d0cd60d7d129271a329ad6f1d3817ef1103b619696
SHA5126d9c7a834b3293f86641edc4d32f4531552aee938c98b0b9ba225fe1515c732c2244352eeea3dc0bf7eb22a8c9d0af5dce1c6eccb2e789490a24b0fdc045e593