Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
39109bd261a19c32d403449a82da3b65_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
39109bd261a19c32d403449a82da3b65_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
39109bd261a19c32d403449a82da3b65_JaffaCakes118.html
-
Size
162KB
-
MD5
39109bd261a19c32d403449a82da3b65
-
SHA1
77679ce889362c2b30f2595146a46a14b548d0fa
-
SHA256
01f7fb73dd98d517b772768484e94972e41e171d97beae9eb30dbadd76bcc9e3
-
SHA512
0106232fa11f010c6c34b115f3b4ced0dedac7c5f91231087ff41ee99d060be16aac1c83cedd463776e3b250f9f883763d0141c859afa71c37383f5eddb21bcf
-
SSDEEP
3072:oe4EijZeqLVEijZeqLWltxirWCzuk0t8aNzNj9LAZ5ybrpUQUR6M+PeigFUifrC+:/4EijZeqLVEijZeqLDWCzuk0t8aNzNjG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 3324 msedge.exe 3324 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 3520 3324 msedge.exe 83 PID 3324 wrote to memory of 3520 3324 msedge.exe 83 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 1480 3324 msedge.exe 84 PID 3324 wrote to memory of 2112 3324 msedge.exe 85 PID 3324 wrote to memory of 2112 3324 msedge.exe 85 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86 PID 3324 wrote to memory of 2312 3324 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39109bd261a19c32d403449a82da3b65_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb65e346f8,0x7ffb65e34708,0x7ffb65e347182⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,347512215349233270,7737542315372662636,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD525ba03d31f896c2500d993f606bb3d22
SHA176397bb29de76c8dea6f4ef2de397cb4964a3cc2
SHA2561ca664ea2ad212b3a4dcd072e2c2cb199fd822b22874ad937e620f32693cf0c8
SHA5120867fcab732f174d6c9bf4800c8051a317e1b6f466c9aef669183298af813f1ad8824b797667122be64ff2ada190c88e746e9bf2b72193cea183c590bd3e81aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD566ec3b6bbc556bf22cb2008ae934a6b8
SHA1b6a1f3e9e35c99ef9761e9f0c677540599495f4a
SHA256b8274ed012fcddc6ca59341969e5f885310f3cebebdb729c45c50b66b78f4ccf
SHA51228bb0a6151c934f70386091c358e32db3a84efe941d8df1250c653e1d574f6ac913a4c1d6669d5be82d4ff49ec84776e583355236d4263dcd159ca9db5171fe8
-
Filesize
5KB
MD50de8229701521f43a2db039dc5d9020d
SHA1b84c95032ff8d8a0123d87c440d9b5786e03be2a
SHA256ec7223fe037ca9c8d64d9451554873caa7cb80d0f3810ebbbe807a13ef0eea8b
SHA512057799f26be470053001fd6c6adf9c4e130b78b0b680235d7bb8d540ec54f47d9ab03311882e55f42cea50c0752506c4d471758191644263413a6147476fa127
-
Filesize
5KB
MD50626a0dd24b581cd2cb9a284ab90e837
SHA1807b7714a3c6cfa624496f3f3ebe121132210dc9
SHA2560b581f57a766abbb8d5a22341d5237a582da2c22d235faa72d7fe19c9a84b352
SHA51220c1b9d3bf3dd7d458fc2d3bd286f9f868cfead6bbd5812118841c16969bd059b80c9a431f67c248c20fd64b3aafb9ca73a72ab24ac6f4c3d02ce45cdf7d9476
-
Filesize
5KB
MD5c96846b099138ebc29d386ebf69ad022
SHA1549369d293ebd0faaeb372fcd8a3e4560f1c2e8e
SHA25666325ae8967f628bfaac9d4372abe55311c7a5d41505e67306c51ef04f849107
SHA512cb2dcd0102280f5b0c85e277642222f8674b08f814d3795cceed74c0d310002cae5b410adfcd124dab53880b050f02777042fb2e117c6f2044157c007e5dcb5c
-
Filesize
8KB
MD56721369d34cfe5607e5e1b3873653bc8
SHA1dc93d2114fc127769031eb3f7d76d03b196aab8d
SHA25636f38bbc568fe1305685c4eb0941e6a32e56cf4cd416c8e14a555de607b1b77b
SHA512289eeddb34bb1ecce3530a53c5c901e405a9e4ee99734ddf55f5d0fea7a88d8884d40cba5057c211c9788d8d6f57bd180d786957d6825b495ad5ab9b1d8e1b1b
-
Filesize
11KB
MD51495ce806198783063b0ebf856bcbe51
SHA14a34d621d5dec9d3429a9ae657343b9284625294
SHA25615642348b303d1914a2f1d0e4fba7e188ae0e970341bc670109b4723b35c80b2
SHA512607ea69d5cfda05eb2b3dce99e0860985a7450a0c22f2a1b5c3ed545e27ff5aed84a0549c12bfe024f1c24959817eee54316ba2cea9959ebf60c35bee443c4eb