Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 16:47
Static task
static1
Behavioral task
behavioral1
Sample
3b1b720cfcf810badb4f224d0e18e77e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b1b720cfcf810badb4f224d0e18e77e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3b1b720cfcf810badb4f224d0e18e77e_JaffaCakes118.html
-
Size
34KB
-
MD5
3b1b720cfcf810badb4f224d0e18e77e
-
SHA1
bd62bb5dbc32826ac4225046fde0d63b20878191
-
SHA256
a894a322a94b8380dcdf63246dd941f37cb191ab993477e48d18a0688e96538c
-
SHA512
09963a8128dfd58a59f7daf2ec53bc2183c68ce991c5c1a0949c2459ffaaa60cb84aac691a2cfaf24228a6cd0b6659892fe42dcfe6c5f7aa200369e5028fb2e0
-
SSDEEP
768:PKGkDQyuAta056ureIpBAwIcEeSf7dFVhsjF+xc29pp:yGkD6aNpBAwIcEe9F+xB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2528 msedge.exe 2528 msedge.exe 3156 msedge.exe 3156 msedge.exe 3028 identity_helper.exe 3028 identity_helper.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3984 3156 msedge.exe 83 PID 3156 wrote to memory of 3984 3156 msedge.exe 83 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 4808 3156 msedge.exe 84 PID 3156 wrote to memory of 2528 3156 msedge.exe 85 PID 3156 wrote to memory of 2528 3156 msedge.exe 85 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86 PID 3156 wrote to memory of 4248 3156 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3b1b720cfcf810badb4f224d0e18e77e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadc1246f8,0x7ffadc124708,0x7ffadc1247182⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1776 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2622214643550175121,5813661885143955692,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
1KB
MD560179bdde323dc7282dada067ca5d02f
SHA16fed6ed9df594f20c18e1d0904565f5c6c019872
SHA256b5ad133fb5a88abbee391ceb3f43fb6e2467f25cc90c3f78269b3c7e5f35d725
SHA512009a99af6035794f35d9fae9e33d42eab1a45cd2f295375b2180ce5374cacf52d213e5d4534638321b2158d44471b8603a6fb080e4f739a107cf3d0a285b266b
-
Filesize
1KB
MD57aae86b134aa1be80c8aebfb6d4b323b
SHA1936a8e38b7423342e9983fe74dfada39c0bb3248
SHA2560cee0481cc85c7664d9887e33f591268736ba7d9b5dfa32c3295e9d10561c9d2
SHA5127acedc0161d897038a18ddb7eb8d13a14d321babbde52214806be35488cdfb18b5c5fc3340aad2305f0a059dcb1e9b58e81dd2fb7fe8fc7d9e2ca08985d1889e
-
Filesize
5KB
MD54f8f9725f92b8e6308fed47f5072144a
SHA191afe0faddac0dd38dcdd7db7d1385b9e4dae7da
SHA256e69c907846055ea6dd6e8e3b40ac1ac8b5836a35bcd633ab1c21f55a2bde8740
SHA5125ab26eabe0e0f19b31d78c8bef2770698bb3ebb1e8c36c5226398737328e809620e2ad44a1b88822f19bae0ab90f06b7871bcde8aab69b9abb4e1c7c09730f27
-
Filesize
6KB
MD54ebd7351a3e541a00b9196e1a00f8395
SHA1bd56505b6807430be87540f510bbd275af9e69bd
SHA2569806fb47e00f559f3531e49a5b90d3e9e3dcac4277f3f7f9df5ae270f4220246
SHA512fea16ca9c381f077ae04fa6554cb3cbaae25e4d4b3d385d2474520b67f96e9ef2eb265c537338d29665bdfc90f49e44479529ee1e0a156d5bb532a9a0ef28295
-
Filesize
7KB
MD568f96cdd1d3518e1bdb569ccac535b69
SHA1e2dab89ca40d8f8e282d48848140b22b04990a48
SHA256121bdc624b815177c794150d4ef83389af9578461bab506d38c0cf6f1c9aba40
SHA512dd87a627bde2e3375c51a6942e1e3127067ec8e8c671df217a2d3df9c22657f5ef3de14bb30fac73aab46c2cfd23db5030203fe52307b82f1a1d2444cc22e010
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a5ad1f40c38c91908e2aa4517b5b6ccf
SHA1b7b3dc273fa7385bdac4c5f78d4685d493ce5df2
SHA256c0fc30af622d4156c6673bf980ae566a9e7244d59187be2c9db9285758777254
SHA512d49011583c8b99eb637de33bcefc1bf44e3ef1f004aa6f752100a483fce864f904615b2301c3c64ad1732631b3c8c1c27b9faa8f6007632278d3a3367f631f1c