Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
39d05398116a697431fb6ae74cf1b7d5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
39d05398116a697431fb6ae74cf1b7d5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
39d05398116a697431fb6ae74cf1b7d5_JaffaCakes118.html
-
Size
16KB
-
MD5
39d05398116a697431fb6ae74cf1b7d5
-
SHA1
e06e3314e1ccf1033c7ca4b28153a254b341fa11
-
SHA256
cbf52ce662613f06f67e9e491d23a4153ff80e8a414da208def57ae1b2e0d002
-
SHA512
2f17065431d30caddebf342ae34eced6bc5e0e85482395c2a63a2fa38021d76c879f236215558e515a77dbbd11cad59e6fe34e702ffa290edd62dcf370a803e3
-
SSDEEP
384:rSGczXl4V3TznDriuYhvIhicuMtPYas1+a/J2:rRczXl4VDnYtcgP7E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 4888 msedge.exe 4888 msedge.exe 2720 identity_helper.exe 2720 identity_helper.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 3264 4888 msedge.exe 83 PID 4888 wrote to memory of 3264 4888 msedge.exe 83 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 768 4888 msedge.exe 84 PID 4888 wrote to memory of 2520 4888 msedge.exe 85 PID 4888 wrote to memory of 2520 4888 msedge.exe 85 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86 PID 4888 wrote to memory of 2556 4888 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39d05398116a697431fb6ae74cf1b7d5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc715846f8,0x7ffc71584708,0x7ffc715847182⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,10250986466834248432,10837546719237242785,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5bd3384b4de62550b4733e1e26f9ff42d
SHA1aa1619b4acfb4ec58bff69ff040f48aad43786f8
SHA256db24ff498bfbfee3de6554d3df4e1fd4c5af7efb544c899f773785e1231eda20
SHA51244448c65aa420a7ffc6368b45b556fa43ccb19af876547eed2ca2dae41c176ba02bed2a4c2f428c9f8d3aafc8d26f0716dfe03f87cb08806cce6d76d2321b778
-
Filesize
1KB
MD5973f238fde84dfcf286ac6191574e3fd
SHA12e3a7c8a55c524224bb0c3d5c58738715cfa49da
SHA256223a14a76cd8a16ea6eefed30163bc595329a129a2b545f7a126b3934690d572
SHA51241e365f427a68bb8713bd4f3b743745fb5c228d9024914fdece7a46d75ad1fd2d8746b3f76d96dbe49e74f59ecdaed3ec1245bd58044c8101f3dc46df4f7c63b
-
Filesize
6KB
MD573882c2506f0859fd986b74bcce0ec7d
SHA1537d896acac0af524dc704485ede427756e40bf6
SHA256d0f4f25477f0fb2bda6aecacb29a2bbfe249551a1f8cc2a13597cbf99f3a9c50
SHA512de6c25e65f2ae9cca2b89d5ad756b762d86a75cfcd3f2666c693c5eb113bc417c82501f18f42b058c31ed209517dfbc2024de6ef23fea332f4052ec3156b8f6d
-
Filesize
6KB
MD5365ed4fca75fce56626e99fdb28128e9
SHA12573bf0bd2eac5c43839fb2790a8a97a9acf699c
SHA25634789479cb4745e4e723e701b745af6da5c059bd0664796e2a3d5e6da8373984
SHA5127bdb929eae1cb429355924868c1f73193fd434734468a80a7a88abf8cc9826efd903c542c69f6f8d54779f301f4c80ed7ea69aa31b6c72383af84a3231431e7b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56ac4e03cf4378d45d55e2163c436110c
SHA13845d9cf4420a708cb198602a1d74ad2a0f6e3f5
SHA256087efb5c4ed68da5bcf89ce05ae714527a1dd68a55767975efe18e4d4bf5e8fb
SHA512758e6ad383083f5a5df1d0c65c85f6caa33028999f2ede03e84e6f0e8e111728e71d3a26a2107a1367f250d61c69d9bffae053c0258b8d04cd76eb2d45c3d512