Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
39ee89b27b837e362791caf606c5e50b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
39ee89b27b837e362791caf606c5e50b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
39ee89b27b837e362791caf606c5e50b_JaffaCakes118.html
-
Size
5KB
-
MD5
39ee89b27b837e362791caf606c5e50b
-
SHA1
7f51ec5338fbcbe41f56ea79c5ebaf7ad598372b
-
SHA256
45888381d51427085e68fd2f54bd402dab583e98984481e806d2ee294448d6c8
-
SHA512
47414900c3d85648028a35674678b0e2c8540aa42b75cff96bfd012b4c874809251894dde2927ba3eed22e50c360aae33df36a1e640173e55e3127a132d2c4e3
-
SSDEEP
96:/JxnYYtEEBiTMawng8HScJ0bv8Z12XY73Y7kzddddddddddddddddddddddddddc:/ntEgiTMVPSe0bc12XA3Ak7Ju
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 392 msedge.exe 392 msedge.exe 644 identity_helper.exe 644 identity_helper.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 3332 392 msedge.exe 83 PID 392 wrote to memory of 3332 392 msedge.exe 83 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 4404 392 msedge.exe 85 PID 392 wrote to memory of 2292 392 msedge.exe 86 PID 392 wrote to memory of 2292 392 msedge.exe 86 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87 PID 392 wrote to memory of 2740 392 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39ee89b27b837e362791caf606c5e50b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffc06ba46f8,0x7ffc06ba4708,0x7ffc06ba47182⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8262524813329491817,2211324056196529135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD586c2278c5d8cf380353f1a90889c2d5a
SHA1b22d9c181681a1515675324a6c8508d45644bb09
SHA256b650c99bc06f10345a7f39a02513e6f3417b9e5da933ea1e28c54812871a407f
SHA512ea2615bd36de824e62c19ed2126c41c1e3bcdf595eda75a6aac2ab88a3295b4666d133d7f178d55af9e15886475b60524f4c7d69cfdc1c997c9128f59901ea96
-
Filesize
827B
MD5969f6f22a0f95fa57ada647411a8e14f
SHA19e38c9bf78dcc46c89e89b8a1c41db9d9ad18e84
SHA256a4ceff5fc2e1bc5e835f7bda7f28251f31db4020b7789585795970a4717eea5b
SHA512ddd2a3322a060f075c9367d3bf7b9a1925600d9becaf19e45ded7ab96ecfdf1ca7a6a83dbbb64ba40c9a18bc73e6cbd26dbd8751723068bb9a759e07754c0fb0
-
Filesize
6KB
MD569d85d72f038c7498d3812b6cf25496c
SHA1ccf79b5c7b7d338746f3164b350997ef8afd3c49
SHA25600900d2eb9a10733e204952d9efcf9a81eb0f9de6f144cf370843101622092c9
SHA512ecf4f7cecd183a180034f1295776f4dae99f1cfb6f2e343ea4fde9cce91f40c9cb44f1bc60405e28a75f31faa50874536e12481dccf0cd75c39faa54e724e9de
-
Filesize
6KB
MD5253478bbf9b0e9ede42d6c08a7d12f80
SHA15bdf3e4be3118965bcb1d0b988b3fe3f14ea9d12
SHA256ec96f148de2a90fba88553a96f3d1917d96d0f37106505ae7abe77b45d28c3fe
SHA512166129030d0e218af8774ad3ec5b31640d6aec9426b974e7f03876e0955eadf785c8659d0b2d6b0cb1197c09c68379c912b54df9ead0b815a71926454fc79a2c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52bc956d6479816f1ccf2853ed56b1a82
SHA1e654a9be467f86ae3c9420189d6ef8a5650363d9
SHA256ab2ad4aaf9795bd8d1386b0df45407c94375a362812d99ed69f4124cb88eac25
SHA51242808aa45c2bb9238539bf08894c3e462fc7bdd8868f0ef665d79a128c6d35f9f9f94364988d7d32df73638deea132340f890604bc3e2fff84c6975529db5260