Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
39b99b53f1ce09a3a13e4a13fba8833a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
39b99b53f1ce09a3a13e4a13fba8833a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
39b99b53f1ce09a3a13e4a13fba8833a_JaffaCakes118.html
-
Size
35KB
-
MD5
39b99b53f1ce09a3a13e4a13fba8833a
-
SHA1
cd97a4a4a1c28be384e5f197c79d2fa54779c8ab
-
SHA256
002412582753886037e1e3509718e29b4b01734e381a4ab9d44b1fb8b390738c
-
SHA512
9fa91ca3cd8655aa197bba32569a1e447e7b7b332d30f1443caa7563a2b2f8150959a75978c43270bef432fc766378ada88e45d4ca59a74283d0fc895d15e7bd
-
SSDEEP
768:zwx/MDTH0u88hARJZPXAE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T5Sl6zBy6OxJy6+:Q/PbJxNV2u6SJ/+8ZK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3564 msedge.exe 3564 msedge.exe 2632 identity_helper.exe 2632 identity_helper.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 3200 3564 msedge.exe 85 PID 3564 wrote to memory of 3200 3564 msedge.exe 85 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 4292 3564 msedge.exe 86 PID 3564 wrote to memory of 3828 3564 msedge.exe 87 PID 3564 wrote to memory of 3828 3564 msedge.exe 87 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88 PID 3564 wrote to memory of 1964 3564 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39b99b53f1ce09a3a13e4a13fba8833a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8cff46f8,0x7ffd8cff4708,0x7ffd8cff47182⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,17785839661154790526,4759790136758598027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1604 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
614B
MD505a3ba43f6743868120356a3fb3e8187
SHA11f5d736b2b296f8c850597ed45122d17ecdc0bb1
SHA2567995dcb15189232b3d5fa701eecaedb98aa3897d501c9dd081bb6c0e690f385f
SHA512c6e6efd1393acc90468f742daee64aab7752dabb0ef87f3ead316d0e951b599bcb66e99d2de2a93f7d653a8e0e56fab90d5ad19b77cde5872a4e146cfd0627ba
-
Filesize
6KB
MD528762fd6689eb67c98db607774c6bbba
SHA1da159321350033a36c2bf73a26d379235127d4d3
SHA256ab271e60936df7cae0fd7e775a113f9678959fc724fa7c521816ed3157e37b53
SHA51235d9aa2590f724ea31e3d121cd4406d8c2168f4e24304f7baa298e80be402c1fe077f7204b0fb27f6cc61b0749f01ae9414457db0c2dab2af31f1fa02e03fbca
-
Filesize
6KB
MD5f1936d710538295e3819ab05d4917fc5
SHA123c78b5ac65fe04536b22091b4bb4e67f0ca971c
SHA25697690ad7b19ebd266c17224239d167437a7c96a861d915fb46e69f7162b25e75
SHA5126492e3c5b2cbda126a2bfda7f2dc23dd3cb4e0813608d56c9bccd5a64e71c9b194d9b79e55df53bec3efdf0c6982e31afee56acf0fb660dc8f4e35770cfc5e24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD546471d409f3f999b17ea712ca3c9388a
SHA12591befeb6a33ed8d63e7ac88e842b717b50b717
SHA256ce54c781ed0bd40aca1377e167544fc4dbe99722222a3ea879db530d8f37c8fe
SHA512649f9419d50a43649f518dd7c4687b0ad71819e405a0e03ba8fde62b22a5333f6941d393f7481d29ed5739f50652baaef7a8bead1c9d089ca7f18bb0498b4791