Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
3938bb8d8475acf8e655de9ab55ef1b9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3938bb8d8475acf8e655de9ab55ef1b9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3938bb8d8475acf8e655de9ab55ef1b9_JaffaCakes118.html
-
Size
56KB
-
MD5
3938bb8d8475acf8e655de9ab55ef1b9
-
SHA1
61dcc858002dd5a66a568728a62788191153fba5
-
SHA256
cfcc742dd5f8215bff074bdfc83fa70d9f194c7eef0b476e703af90c23c3fcda
-
SHA512
08edc1ccb7f51e9946f188ec7eac9b13467e0f99e353759319c7d5479681ac600ee8f7b6f2e80cb5a2424e07aa4d68bcae108b243ea9806bb2ffbd850a04a95f
-
SSDEEP
1536:r8sXXrChq/6AA80r+TkIwcQONcRiERWPSdR9D0miiwh6ZZT8LEdsY2eBci0zQYyx:DXXrChq/6AGNfcQONgiERWdKXYrMFrwY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 804 msedge.exe 804 msedge.exe 1852 msedge.exe 1852 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 5032 1852 msedge.exe 83 PID 1852 wrote to memory of 5032 1852 msedge.exe 83 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 3988 1852 msedge.exe 86 PID 1852 wrote to memory of 804 1852 msedge.exe 87 PID 1852 wrote to memory of 804 1852 msedge.exe 87 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88 PID 1852 wrote to memory of 1340 1852 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3938bb8d8475acf8e655de9ab55ef1b9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb01aa46f8,0x7ffb01aa4708,0x7ffb01aa47182⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,18037835624838925304,14125744527514033583,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
1KB
MD507d6b2430978f89879cb05b4457c20b9
SHA1270f3dc4e88319a9921161eab1176cab26e4c4fb
SHA25646033ed5259d50c633f3a0620a3d755a1e351d2a9755538a1057d677c76bb312
SHA512b75269ae2e111dae3c159ccc9afb2c3464c34542deab204a8afdef610811b73834886f31957b4f080a4fa312a1ef4177d0e41d98bde3f667a7cb96f4f2b922ce
-
Filesize
1KB
MD5e47b07de2ca41234610adc35575ed546
SHA1cde4c7fac92c23c241a7fa9f935d373748f8ec00
SHA256c19f5d5127ed167b6888a25a5914cf7f0a9bdf465ea65472779ce95e7b838005
SHA512dc96c0939aee8daf18cc5587be91f893f33a933190b6df92444ca000e453b0daad17fa9165ec2eab906d8dbe2781dc2ea1677177f87d24bf83e27e34adb7ecc7
-
Filesize
5KB
MD5b65dceff7576cd3cb2699ec9117d7597
SHA168a3aefce8ad736dacb7d0f51b3c11fdfbec3cd2
SHA256895ad087b93f577679f74a45e5f1d09f289b906a191153374043a8c40de3ea95
SHA5125f87a4fd6e5f9bc042932c63eb480f67fc42fd7ac7239ff02294c3929031c084822c111faf8f81ab402dffe8b600cdacb3b101d3f879d2b9f5396e35369763b3
-
Filesize
6KB
MD5a21cca0841f39fe92a30e6cda3cf487a
SHA1733fc14455ec70af9b26452ef2e7221396b72de5
SHA25644dc26bfddef75f05286e6ec2740cfa9646e43c35db31a58fa8ae00d7a470472
SHA5125dab7b909a0cb046964629b7f778af35dbfe8146d4a22ded53d878c83546517aa37c01bb56addad57a3a2682f40f1bffbcae777d50352d4cc59ce2e40ab71fab
-
Filesize
6KB
MD5038011b5803b77637e52e6c4e531ab7d
SHA16ab654192088a32ec6cf6b031057cd6e92c9cc6d
SHA256d9b9b5657c3ef9dc95cce894f7d08aea1ca5838a87256a602b894d215c05a9c7
SHA5124b55034f40d5394dc29b9c0e2f11b3e8818d3b467383c310851e826a7c0024b64a6b27937fd388a305eee548ed649a30c47d0bbbdbe49fef03628480c61d31fa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50e585c111c0a2b7bdf7234802ff864f9
SHA16446c87683df540824c3260409a564287157cf92
SHA256cc059cc228eb8e8bf2c3245280e3e4d198e5a29bd451e7fa06500a70f1695ca6
SHA5124836d34af6cc95176c738f6c78de4a50918e73517c047595954a7fb592f5f8f2dcb1ce20e45517aedb611ff7d4d814339b9b922c9a319bcb6701066e1ca3ad46