Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
3cfb93fec04b74ea8334bfd1de7bf22e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3cfb93fec04b74ea8334bfd1de7bf22e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3cfb93fec04b74ea8334bfd1de7bf22e_JaffaCakes118.html
-
Size
121KB
-
MD5
3cfb93fec04b74ea8334bfd1de7bf22e
-
SHA1
85cfbe866476e0e8231bca83e4884aea0280f6b3
-
SHA256
f13e0a2a4ab42339ab87592c1d1424112a8e4f3498b5bf60d3115d1c131b5144
-
SHA512
7834a2d2ae45f9311cb728e421810ff43c60b6b5e76399281c333cb257940903623841cdbae2719f53dc3c945e0f8ea1f04658f11027eb2265ef84adf207e93a
-
SSDEEP
3072:Nx4gooyRxfLcrPpVPKPIDvVTKr9b/JlzXHn+:Nx4gooyRx0vo9S
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 3744 msedge.exe 3744 msedge.exe 2212 identity_helper.exe 2212 identity_helper.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3744 wrote to memory of 1816 3744 msedge.exe 82 PID 3744 wrote to memory of 1816 3744 msedge.exe 82 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 948 3744 msedge.exe 83 PID 3744 wrote to memory of 1160 3744 msedge.exe 84 PID 3744 wrote to memory of 1160 3744 msedge.exe 84 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3cfb93fec04b74ea8334bfd1de7bf22e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef99446f8,0x7ffef9944708,0x7ffef99447182⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,17749923209556196835,5026591511269255708,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\31a198f9-071f-4a3b-aeb9-3309e43afabb.tmp
Filesize6KB
MD5b30b674a26f4ce860d0fe729150fdba6
SHA1bfe90a70c93aafbecab96771aef095ac8b5a6460
SHA2560ae5f9159f12d5af4d05b800b00b4ece9c77950efe3aeb277efde0a1b0b4b732
SHA512c7a9a48f9eb72d976f7380e34f69f325c7a74cd242e5d38611117362ae94f5721306d0e50f27590f85c96f80743562126055eee92df6c8502db371182d7f8c05
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a7cbf0f1b296e2a22cf883518c30ab96
SHA1713c232b95317cb8d1e03466575aebbe38584337
SHA25637dce6d4107c6ef49fb0f15df14d19f59dc0326f47f9c9be75bb1e4f58bae02b
SHA512f889491688da36ac94608aa396a815520e7cfff319a98a6026fae542d66396d9e44e28d6190799506eb5d7a5ee5fa5c1e483cb20c24905afdf24acae13fcd6c6
-
Filesize
1KB
MD5d9555a316be0895cfff91aa69686b95e
SHA125ab8ecbe4d9e1e3f69812cd08c6c493270b6dd6
SHA25653c5a8d2e7cf89aaaa56febafce33647d070d089ed799e24d894b847e19cbc82
SHA5128f088c86ad6e2f07dcd296cd7fbe27a42422877a88aeecb8a563b38290b00834200218638786066b75a0cfdc168b774009bb565ce797fdf44988ac62d2a2402b
-
Filesize
7KB
MD54759a175e7780e92ca3a38248743d922
SHA18341f9f5cb6623275bbecf9b519f39ed6641a93a
SHA25615ad174f0eed9c3b25193cbb7724dae7e7dceddbda81881d53f9437d9340d0b7
SHA512ee3dace2e294f318fed647a99976e568677e2e9531c397fe0c38df0931037f0cfedec87bbd8d92acd2110ce5a5f6360ece91d0bb3c2b4e2dd075a3976baede44
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b4b02843b2013a33a7a0fc6e3f1901b4
SHA1a2c52851b4ca7a412e07ee77fc4d5207e63250ee
SHA256cbf129fc2701484560110a3374af6710dc0a7b5870dc810d1becef2324fb23da
SHA512eeb2cbdb07a5c66198ef091a3793299e98dcb8ffa777c3c244cd236c9155f51cb96df88d7b6b8267dc728d3be1faffecab8b56960041748a9904bf37bb178c16