Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
39c5b0779be533f7fa08f6fb0d4f809a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
39c5b0779be533f7fa08f6fb0d4f809a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
39c5b0779be533f7fa08f6fb0d4f809a_JaffaCakes118.html
-
Size
19KB
-
MD5
39c5b0779be533f7fa08f6fb0d4f809a
-
SHA1
b9521f9bf7249b9fe032ef961ccce79a18a973a5
-
SHA256
871feb4aba2d71f68163fea1299e2a6cafed1c07b89862d93ca5eafc5884d729
-
SHA512
fd98c36bd38847b0ea287ad5e816783b5c3f6918333687e032ce67b67419c287d8eec1d2794e9c09bd760ff99d57e6b03311ff06db69018fc0cf4c23fc2efe7b
-
SSDEEP
384:iwlPItv4PB42xCPjJeKJzr52T9GYDkuTSXGNFecYUHsNMjXDoMcE6jNo6J:iwlPQgPWg3RuXGNF7VjTpcjjNo6J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 4424 msedge.exe 4424 msedge.exe 872 identity_helper.exe 872 identity_helper.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 1336 4424 msedge.exe 83 PID 4424 wrote to memory of 1336 4424 msedge.exe 83 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 5080 4424 msedge.exe 85 PID 4424 wrote to memory of 3372 4424 msedge.exe 86 PID 4424 wrote to memory of 3372 4424 msedge.exe 86 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87 PID 4424 wrote to memory of 4856 4424 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39c5b0779be533f7fa08f6fb0d4f809a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae4c846f8,0x7ffae4c84708,0x7ffae4c847182⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7571026162349414914,4616917427901284973,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
6KB
MD5cc06e64a521c69a5a6bf195c51192817
SHA166d19378a698360bfb237ee130c82a1a079491e7
SHA2564c0126ab469c52eddcbd0128334b44b10bde77ac19f0f938b792ab6b4177fce8
SHA512746db5333d921b82ecc7db1d77ec39e8eaa61911d5e5e5d762502d10215d9b31e41a862287ae8094caa03f0beca29bcddb58f81117e2cf5208e4987e45ac644c
-
Filesize
6KB
MD5a27a44e05bdc0a260c0ef71438ac417d
SHA102d483b7254bff1bc157c4cbb97b7d5c05911afc
SHA25690043324f82eaf16346db57585c3c4da4846760b172d5f9ee33c927a46162287
SHA512438bdc21e25d5f604b46c143ff92be835a7af206077cd39b807a0fa384ef5fb7dde13c135e8c732a172af6ab0928fac283f4145e2a13fff107e92b3786d944e5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD593f4a0280f94ae54e3fa2ecf46a2a0c6
SHA1a9544795d2222eeac732e378d929296e8d0b166f
SHA256edc589e2df65d3ee7c56db03c8abbbfc35ef837f98b7b55711bd55bf3e8e6a12
SHA512a79b6409fb47796294ac1f63f89b21abad59b1dca0660a405546a3b2ebe07de90201d9420c10984c5309e8b2ebc1e61e546a02f9b914c17ba6a18bb3c40092b8