Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
3e36d2b7aa777d8c1d5c96ece4acc717_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e36d2b7aa777d8c1d5c96ece4acc717_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3e36d2b7aa777d8c1d5c96ece4acc717_JaffaCakes118.html
-
Size
53KB
-
MD5
3e36d2b7aa777d8c1d5c96ece4acc717
-
SHA1
d56b78d40c5821ea5380f2cac27bf2563ac998d5
-
SHA256
c33e39f036b99857bb0fbbea7f7befa9da634c0b1f94a2dcee90b2e101181f09
-
SHA512
c1753d51e15e7d8101d10e8a9a527efcbaacfb57f10f0c0f26010f238dae48278b198538a7f7e80396bb97a018b3355550d46fa70034da36ca144a332880310c
-
SSDEEP
1536:CkgUiIakTqGivi+PyURrunlYd63Nj+q5VyvR0w2AzTICbb5oS/t9M/dNwIUTDmDe:CkgUiIakTqGivi+PyURrunlYd63Nj+qA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 1504 msedge.exe 1504 msedge.exe 936 identity_helper.exe 936 identity_helper.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 376 1504 msedge.exe 83 PID 1504 wrote to memory of 376 1504 msedge.exe 83 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 944 1504 msedge.exe 84 PID 1504 wrote to memory of 3992 1504 msedge.exe 85 PID 1504 wrote to memory of 3992 1504 msedge.exe 85 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86 PID 1504 wrote to memory of 2572 1504 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e36d2b7aa777d8c1d5c96ece4acc717_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb24046f8,0x7ffdb2404708,0x7ffdb24047182⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,4584232308861766803,10437808958026137360,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
403B
MD547b503da3da320f333cb443d7f58f0e8
SHA1b4ccac4f907103836dece0c6da83e9a2067b46c9
SHA256b1fae8a6377d53482008418c073502c474b116b026075789a84e97e6313a63f2
SHA5129374b2ff85e8939a792d3b55bf7cd85a154f0e8d266f611967b8d1b3c136fd539d56ad641124a60fd8ec40d054325005739486b60d9b00b9a680618caba09755
-
Filesize
6KB
MD54a0691cb11e2cdee4bcb0f706405e63a
SHA18ee9689c486f64ca88a6619d860ce30008b822a9
SHA2560c6d8f24991da26a5914629ef847b8518682fcd960ed4a03fef1942576136f8c
SHA5124ea35b80be3b5c8c5b2bafeba078d6b84a2e47eb7c42ae26e83a44be35a21177becde78bbeb872abc94a75b1a4e8035e7c7ac06a2e963124bf13b9be73b5c25a
-
Filesize
6KB
MD511ae6f88317699688b9246d356fe01cc
SHA125cb62c34e061fb8ea126362900592ec11f3c679
SHA25692a78e08635406750a60d5999ecc59e4ea29daed410e5e1c156984353647f651
SHA5121927b48473ab10bf2d10e6903c43773f194df8d9a5add1c70e075635ab55024ff13bb0035a62b428fbefd8879992a3ad7377a527b030bfe22b5ae062cf7914b8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d3e198d4c05208d0fe688845f779d1b1
SHA1d635aece21210ba0c2c54f8b880ae9ef482a566a
SHA25686bff2eff95eb0f031906068d3c32e1a2acfb427d655393de767996a4550af5e
SHA512b04577de566feea557514b0e6129e2f8a731910c741bb1ffd0f74b72b61d1519e823e5538dd77c2da3f9af9f87e5d7a097b572e794327ab6f67703210807bd30