Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
3e426760c97e1e0fe320f315b8ee6e63_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3e426760c97e1e0fe320f315b8ee6e63_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3e426760c97e1e0fe320f315b8ee6e63_JaffaCakes118.html
-
Size
4KB
-
MD5
3e426760c97e1e0fe320f315b8ee6e63
-
SHA1
87b54d3f91d984983adfecf01ca207b958d2a0b2
-
SHA256
126184fec89689b97ffc030a0c58c0bb22d8e87079108a046c691349360bb88a
-
SHA512
4df1b1df84ce5a7d2fcfc26a6149044b18eca16ed0e10335277de6974ed43dc1ac90b0aa91c1f38c260b567a2ecd9e1df0878daa80a97a708bb37531e6d09220
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oTgy572d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 1452 msedge.exe 1452 msedge.exe 3132 identity_helper.exe 3132 identity_helper.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 3596 1452 msedge.exe 81 PID 1452 wrote to memory of 3596 1452 msedge.exe 81 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 2876 1452 msedge.exe 83 PID 1452 wrote to memory of 4660 1452 msedge.exe 84 PID 1452 wrote to memory of 4660 1452 msedge.exe 84 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85 PID 1452 wrote to memory of 4256 1452 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e426760c97e1e0fe320f315b8ee6e63_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff89e6246f8,0x7ff89e624708,0x7ff89e6247182⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16859704322349910534,17151741430213039249,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
292B
MD55de66706027ca2495ba903d59653b242
SHA12887da177bd39ab1b61bf84fbe09e163751ef8bb
SHA256008560fde54910e4f45543829e6ac45f8a32d34ae9ccd82fe24572d651efb08a
SHA51286d4bdafa5226e3324b9932730ad851b2dc377247768a5c3a776245d66450ce7435a688b1ad877caf3ebd1b9d1ad694e9eb35106d76ae54f6da4b18c8e3bc30a
-
Filesize
6KB
MD5bf24cadf215487e78504bf5847c531ed
SHA1a45a9e3f14090e6647a532aa2ddf808cfbb9c9eb
SHA25689d78bdabf677deeada7b86c03a2a88ea4ff907fbe8dea4f39b1b0a9dde6e21d
SHA5125648db20410d37433028cc9837fff55d02aa1019dc127c7ac7f21e11beb4ec93f7ea566e6144163f9dfb069570ae794ae963ee024d0c9aa073ad342ccfc94d51
-
Filesize
6KB
MD56d4bb2252b0038b184ddd26c161acc38
SHA1c92b379212f37c50256e579a12890294c8e38228
SHA2566200aec9f1fe120e0b5c149efc85ee5791c30f8c2207c42d81365f2cf83563ec
SHA5122c908979372e3c57c295bf8ee74d6a2aa11acb634ffe30e6cc9b61daad76d21f421c586ea6df7cc6d4921f5efe76d5f0dfbd49802f956e61e66e9b927f0ee8b3
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD545ed171f6dfc719afd8349af715c9f31
SHA1b8c21c27c8e8a1c2241e5e30616918290f4341cf
SHA2563da0a2f0454ad21ea9d3f3695536247bbeaf0c303473e1b873f5459ab619c1e0
SHA5125de88a772a947849062d230aaeee89d57e1fd19d0a94c606081daf72a7502fd861809daafb316392a0f3437f345bd9e4cb7f420b318316c8b35040e70692b0f3