Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
2917763c9be7816f2a48e8e09f4d0eb9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2917763c9be7816f2a48e8e09f4d0eb9_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2917763c9be7816f2a48e8e09f4d0eb9_JaffaCakes118.html
-
Size
41KB
-
MD5
2917763c9be7816f2a48e8e09f4d0eb9
-
SHA1
c7babc429512ce3f785e02c895f2b77a93314ebc
-
SHA256
4c5585038b27d0ecd7a366582a4a6b34ea70d0aa24d23aa9a68791d3ca7ed11a
-
SHA512
8e7e3d37d518cc55ca1fdbdeedcfde68d6dc6fefb02b82c00601f41729bdf225b7a3e9bb3a4ed49368fffd3db7aadf8f81f998a2da61c6a68bd5efc6bb516917
-
SSDEEP
768:7k6pHvvCIoo7m1ecsRNdDM2nbUV6XN6fg:7kaHv7oEce3baa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3512 msedge.exe 3512 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 4856 3512 msedge.exe 81 PID 3512 wrote to memory of 4856 3512 msedge.exe 81 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 4052 3512 msedge.exe 82 PID 3512 wrote to memory of 3144 3512 msedge.exe 83 PID 3512 wrote to memory of 3144 3512 msedge.exe 83 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84 PID 3512 wrote to memory of 3656 3512 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2917763c9be7816f2a48e8e09f4d0eb9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaaf8446f8,0x7ffaaf844708,0x7ffaaf8447182⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9831969173332385435,2119237589563083824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,9831969173332385435,2119237589563083824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,9831969173332385435,2119237589563083824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9831969173332385435,2119237589563083824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9831969173332385435,2119237589563083824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9831969173332385435,2119237589563083824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9831969173332385435,2119237589563083824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD59ac7414d3cd8dd877da71d2723138c81
SHA1683d7553356d01ba97a02336c918c9263e3f64ab
SHA256766655046c29f90010917b0a6453c68e83888dd77cea29a54a1413ea530ecb2e
SHA512d6552a26a821fd1e45d88537ee0d0e90189feefcdf1c927fb09746904b65552cda2328adbb747929a9b3ef0c2427ac4028a211af6c88e357b9572c2ba1d1df8f
-
Filesize
1KB
MD542e1889e32642c15298e7d1f1642488b
SHA1dc130ac1308bf45211bcd052f027cfac9755a2c2
SHA256d157ccc852c6e0bf1d7e2b203fcc5b9e080ebe8621f7273fa51370d8c7bac001
SHA512cab31e2a0ca5124a1cd59b6cefad005b28f9d5067a2eefb27e308a15724abe20fb911ddc30be5edb79256c5e25f30d3b54881260da605b9f378c4d4391f3db42
-
Filesize
6KB
MD508d6b4c98d1ed0d943b6445df2623534
SHA1878b6aefe3090e54903fc3f3538fea4b270f6ffe
SHA256676cb09aa69ed033d5c33f2cca3f4b2fda45ba3b50c39e8aed0f6cf660aa85ea
SHA512dab9eb7efbe84dacef0a4ba1074a8c1e0441500c58461fb902fb6783d74203504a1525d3527fa1ae1ae02f1531628656be0eb39cc7d8c0381fbafdc685b32a33
-
Filesize
6KB
MD523b107a1e89f2458bce7e5263ada4f13
SHA1222b22deec23e60e86a976451d0e7c142c28acb0
SHA2564a55603a3a0a9e3ccea440cccb1ac26f846ad16e76b9215b372040c32c9a6f8e
SHA51272e0cefb2af485ca4a1147f9bca5b034826f0c0893265911743cfc15c056cc5be15be9cf7090f4ba4454dba8abe7c902ebf5335b54309ec1ce5b5776ca018b1b
-
Filesize
11KB
MD5f08b2ee9eaf357a6f1c3dc6c58d016cc
SHA11f0be0859b91f9bf5b376122abd8c59a436c59fc
SHA256243ed7188ac695e1e0ac29a51224a728743e558310c17435282af869e43ab4e7
SHA51284848a76c99f392561e4caea8b6acbae2ae999316352b4fb2a3c84edeaf3aaa9ebd3f3e89bbb239054beb0d5d132b1ff7cfa09ac7f9c4e6f1c6c0baf528e3481