Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
3758a82c2d6bb2640d30862b1372d9ed_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3758a82c2d6bb2640d30862b1372d9ed_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3758a82c2d6bb2640d30862b1372d9ed_JaffaCakes118.html
-
Size
18KB
-
MD5
3758a82c2d6bb2640d30862b1372d9ed
-
SHA1
14a08cf37b5e7fc83776769624feac2eb3c776c6
-
SHA256
150b566b6ab6073bb44eb945fa1436117d85c22c40a9c46d7d03283cc539be3c
-
SHA512
3d5257ca6ee25eb8ddfa89072c245d027e14c15813acc2816dbc3220c6a369d644b87af7463323429dd3b4740a7650925352c01ddef916e45c09b20cf18ad34a
-
SSDEEP
384:stlIcMtu4x0GTHk9pmsE5HR6/gcmB+FnjECM/Y0JaguLZ:vaIygcgTaxLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 4588 msedge.exe 4588 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4900 4588 msedge.exe 83 PID 4588 wrote to memory of 4900 4588 msedge.exe 83 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 4408 4588 msedge.exe 85 PID 4588 wrote to memory of 5008 4588 msedge.exe 86 PID 4588 wrote to memory of 5008 4588 msedge.exe 86 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87 PID 4588 wrote to memory of 2232 4588 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3758a82c2d6bb2640d30862b1372d9ed_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4c4c46f8,0x7fff4c4c4708,0x7fff4c4c47182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4360 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,17363310249450743404,3994757588236681088,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD57d9ce14a3afbba54edb13a93634af679
SHA153785d8f0f92bd598c60bc19c2dd1747b5591b44
SHA256fd75185239074d60c7b647135a584967925a60aef2843bee7acf3bcca1084330
SHA5126b761d575cc072186bd0d31bcd30ed93a55da9b2c8ff02299d3fa5452e9dd0c2cf61dab5481c67397765775f4f9ed8c689a448ce4bc5129717782fe3d025f633
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5962e22bcd00f03e00aceeecae2cb3e3a
SHA1d02e8808095a684c7e45a7743aeb2eac56c7f772
SHA2564b91a6cadd090ac05a43116b089381057c3e3d76d4ff6a10bfc99a6b7185fb4e
SHA5129dfbcd883d94cac8706ffa3515abe40414d26eaf57ab410916c79d7859e5887fcac65b25f95b42abaec593c0b98e92a5534dd4bb58ec37f6dd9f182b32f9534c
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD51de902ac0f07bc59736e1e7a71583b7d
SHA12de8327d508375253b1d182660bba95bec510933
SHA25604d7ffba5745d244220cb12d11222696d8d74a16ea92aaa77f72f2ca52169076
SHA5120022652d3bd59ac0f25060fda4783d458483ddeedbff2bb0d5bc414e19454f145b2249e994d71b4298af4010e36c2aaa8c6dd19283fcb58945469a2dd19e7942
-
Filesize
6KB
MD5063e8364fc805edf3c01756d57c3e6fa
SHA165b4c7a4ea3c48f877f92b75981f892a6309c3bc
SHA256f003dddf48e075a46600c15bab602475397f2dcaa4c1b04238666e224d3c40a8
SHA512832fdd23e473ceb78ccd9574744c773160a358e856f000699c345bdf4bc3c301b213fba643a9130052fd5a0f5b1776463622bbf7ad9a40ca87b275bbe6fa48ec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de7b17805bce167dc8fc175de8d91403
SHA1589a6966ceb18ed1ea09234d2fbf7505345c8128
SHA256177b4bb33a6f6886ae991ede202b0e2c48df4f7003542a21a7be889bcbecac9a
SHA512cd29875eb07f7222ab7faf9a81212d20ae0d3a35c7fb9eac6bd9e7da1b71c34c0862ea1838b65164db00b2f01e7a8447ec7b2230d38e015d5aa1d61a7b6f85e0