Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
37fd31431cf3781531c6500a3ea2ec08_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37fd31431cf3781531c6500a3ea2ec08_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
37fd31431cf3781531c6500a3ea2ec08_JaffaCakes118.html
-
Size
140KB
-
MD5
37fd31431cf3781531c6500a3ea2ec08
-
SHA1
72c8d75bb7f01c2135771025085ba5f3cf7b5f9d
-
SHA256
611e92a04c99ef372c6e1588de8cdeb7c7fa09b7deb7ca10cb3f9c509e326746
-
SHA512
41589c9a40b6e873f1358e5ba46f3baec235be12b8c7609127fc15769c20e75b298f090b560caa1a75daa80904179509ca32a493c2f9bf667c72809d8dd27c55
-
SSDEEP
3072:8+GeH/ToXqbIrqbI5rU13G4k5QhLpOatVSTIhtu:8iHVIIIA3G4k5QhL8atVY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1156 msedge.exe 1156 msedge.exe 5044 msedge.exe 5044 msedge.exe 3872 identity_helper.exe 3872 identity_helper.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 540 5044 msedge.exe 83 PID 5044 wrote to memory of 540 5044 msedge.exe 83 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1664 5044 msedge.exe 84 PID 5044 wrote to memory of 1156 5044 msedge.exe 85 PID 5044 wrote to memory of 1156 5044 msedge.exe 85 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86 PID 5044 wrote to memory of 3996 5044 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\37fd31431cf3781531c6500a3ea2ec08_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb633a46f8,0x7ffb633a4708,0x7ffb633a47182⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3000 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:82⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,15288592668356198625,12515716943592098127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a768feb838dbe383063ae7639c7a404a
SHA1dfc416261910b92bd496fa71e6b46bc3fa7fdabc
SHA2569a655d3598e7fe1e72266a3713724e0b0949faf76d11fb87dfee9cb95c49f6fa
SHA512ecd7d614f1eb46324168431f390c5de9801533a5937e16839612cdf1ddacbb5069bb59789973a75c71e4d0a23da63d6f89af52b0a07119f4018a14f57923ac86
-
Filesize
1KB
MD53d4c151c641714b3a6864d38884109f2
SHA128060db7bef173942211fa90d2b521f0f04b01ba
SHA2565c439214f6979b8cdaf9ed4ae77cbdf05b64364c0b2452149f26ef999c30d0fa
SHA512624450c928d6c7b254d83951035f4317db14606b3217f42eeb17550b490815dec181093b42eb3b32fe8d1ee753c4b24340eca6b89afb9336e4d9245abe35153a
-
Filesize
5KB
MD5cb4ac79c1a5a2364fd8b0a1d2fa91fb7
SHA1e0612421f1453b917144772c04de8c37ef045dd9
SHA2562948b6ed73c41baeb03076066e37a70e4d8f3f00eb366622d2d4d0d424f62ba2
SHA5122e356c37e6dd6412f197c6a717542357b32d6c055144d207f4b0bdc8288d374d635300f27148eeddbe56c9384cccd9e5970d0850c6dfd882694b9df410e0256e
-
Filesize
6KB
MD5a58ebfbe83520a26c32551ea0514afbf
SHA17b805a8d99b76053e379991ac8efc1b5670ab037
SHA256ecc1991b9726d69c8fad8b099419f18ca829e6319ac3868b78d890502b73330c
SHA512bdd8ea4cec25813630bf40b61e517bd7050aa07a7b4b78173bce459e2f655f437c67731fbb28b71bc742bb8e9e670bc7feb6a2d59a7e51a1dbf873d562a0b224
-
Filesize
6KB
MD51e85f1342e6af21c1450182e9cae387c
SHA15f2aca44759064e38a71a32ecbd4b8b90f6fa2ce
SHA256c6b0b015246cbd11c47417c4520ba1c50a6c4389ee7d841e6c8a8e5089bc8a68
SHA512cec4e61fbbf70410f56410a086e66c6e71e7df664fa60dbd6225b36cfa23048187aac478b0ebc9966a937155aff3d505df9368efebde8aad1a604260657018b8
-
Filesize
6KB
MD5c1235a9f291e83b3259a39d45da759b2
SHA1c123a00b2687e50ecd913053b67dc1bf945c2dcc
SHA256a17776d93afe5d3b7807279d2e537b3030aa53681a35093d40fcf152af275301
SHA512aa8e73605ae774dfa30617bec50bb80dca002a8a09f042e4315211afa8ea5a75b96dcaf7d28d3d2769774de8ccc7bdd5a0af5eb1a5dbb84c863056f6fd79984e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55cb47c9ac6963d2ba0ad8799f01d09e7
SHA12d653fb67351191d9ef7a281007e1bc69b4a478c
SHA256c005c5d9d5b2509aeff591ef708aa82e6aeee2169227ff989bc2e63ef681e0c9
SHA51236372d6587246710ce444da70b28f3adcf877dcf6b644bb4c50e61481aa8ef5f426ddaeb3e0f0fdc5dd31f369da9f7dbb040bb529aecb041ce7467073f1a8237