Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
3ae34a34c106c191e908935d77225b3e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ae34a34c106c191e908935d77225b3e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3ae34a34c106c191e908935d77225b3e_JaffaCakes118.html
-
Size
10KB
-
MD5
3ae34a34c106c191e908935d77225b3e
-
SHA1
b8472417c8506b614bc7d600a7858fc6fed2d948
-
SHA256
cb91f72643bc73f0922d7f37ff4e8c90706ad44c254194fb3aa1533c7c4c1396
-
SHA512
637853e30e1363d8021cee1ef15aa98ff6439c6d1f80e543cf0e858a128cccf8f49152a89aed0279c75311577880474f9926996fe40f7e1d5af6251fc024314a
-
SSDEEP
192:2VklIsr03hC8k/w1whqJk1uBGdn0vek3A01y5uBuLbdU8d:sklIcuhK/g6uBGdn0vek3A0y5guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4372 msedge.exe 4372 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4372 wrote to memory of 2136 4372 msedge.exe 83 PID 4372 wrote to memory of 2136 4372 msedge.exe 83 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 5100 4372 msedge.exe 85 PID 4372 wrote to memory of 4848 4372 msedge.exe 86 PID 4372 wrote to memory of 4848 4372 msedge.exe 86 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87 PID 4372 wrote to memory of 1576 4372 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3ae34a34c106c191e908935d77225b3e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9136e46f8,0x7ff9136e4708,0x7ff9136e47182⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18429058423088444708,14957880859078489576,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,18429058423088444708,14957880859078489576,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,18429058423088444708,14957880859078489576,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18429058423088444708,14957880859078489576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18429058423088444708,14957880859078489576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18429058423088444708,14957880859078489576,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18429058423088444708,14957880859078489576,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD520015ba476f2c8da4afa42fddb6dfee6
SHA129372acca31f87a46beadeb3eab3e9dce4118f5b
SHA256cbdcd0b42cf8df270ca0e89a8b08b14d507229805b209d19d636feed03e65d97
SHA512d6a697d92a97832b829ccde3122f2f1fefac95cfe7c3217719ad5e8743644356fff54d24caaa10462351b40501bf812d2fc21e6426d40b45ee7725dba3c16075
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b95fbb9bc914d8bea57306551d8de14c
SHA179cf9ebde4cf68ebf367240262cd958c5b443d48
SHA256a118fca226e35cfe608cafa1810ea50a7734eeee9d22b366b796b99ce859a26b
SHA5125d7d47d9e1ee4564936fcc118227bbcc0d25e0be4c4dd183feb99a3e160926b93a82bd4797c0f97e24bd13bfd96dae9a00ef37f8986a528ccafe922276592d19
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5e116666fca57e60f97f2aad2fcb789f4
SHA1ff89767a8e414bf249ec4d8763fc5cde62cef1ae
SHA256df9a95fa5a6f94af3c27867076c21f997720e7c632596c3c50eb6204dc2e33f6
SHA51286e38b0b4c0690fe4a9ac306793f76576b12a64807e23a2ee874dad5f52feca9e04b3d39cfc1714c5403adf5c005b965831ad32332c8ff0edc63dcd4cd9a53f6
-
Filesize
6KB
MD58e3bb24d6f9a944ee416d166f696cba5
SHA119a7aca7d42020b49a620ac6fcf35e03161ff9cc
SHA256b21ee51d75044332783d4d7b1497208c45e90591817f63d57bcabb2e4f990ff5
SHA512c5a1a177696b51af019207e7ecbb50c1f1c510a811875a6a794551493987a5b4cc34f9341dc72e2a615376571df5a4a0fa0b45a8bfc7f064ee26f31a2bbcdcd5
-
Filesize
11KB
MD53923288aac135722490136e90f7e3382
SHA1152a0fec90f24fc566cf2ac612f5ef832ad98b98
SHA2565e8edf8636680a2c0be345c800645a1296369bb9ebf0b6bcb23d0be9b643d0fc
SHA512008e0809b7ce8684e557eb8ddff5d6d95585a4b146ef07b08e528a9cdb4d8d62eabd667fafa3092ada27e81cbcf36e94c17d17643e043dad94d7dd43b4636b3b