Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
3e5f3d4f6b9932c909978695e371aad0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3e5f3d4f6b9932c909978695e371aad0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3e5f3d4f6b9932c909978695e371aad0_JaffaCakes118.html
-
Size
69KB
-
MD5
3e5f3d4f6b9932c909978695e371aad0
-
SHA1
9ff6a8dd2afd4940259cfb1950730a0edb9b1781
-
SHA256
4417163406f3bbd008c2b3584be03cd270fb120b78ffc55a366fb5850df6ecbf
-
SHA512
0e03974e42fa1781b59a37c186dd8b39f8b10c3d49e3a0304bc5ffdf328b1de69d40d5ad85815a30e8b3915b8670554fae482700b9395239e79595c15ae0844f
-
SSDEEP
1536:8ThiUJwGx8BUwg8zgah5Xgx8wDctqvLINRxbBdGW2PFbevCnZ0CseN8msj:8ThiUJwGx8BUwg8zUcpBdGWEjnZ04jsj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 2760 msedge.exe 2760 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1324 2760 msedge.exe 83 PID 2760 wrote to memory of 1324 2760 msedge.exe 83 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 908 2760 msedge.exe 84 PID 2760 wrote to memory of 1356 2760 msedge.exe 85 PID 2760 wrote to memory of 1356 2760 msedge.exe 85 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86 PID 2760 wrote to memory of 3272 2760 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e5f3d4f6b9932c909978695e371aad0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb7f2746f8,0x7ffb7f274708,0x7ffb7f2747182⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2285523640240910792,3625310065548214147,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,2285523640240910792,3625310065548214147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,2285523640240910792,3625310065548214147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2285523640240910792,3625310065548214147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2285523640240910792,3625310065548214147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2285523640240910792,3625310065548214147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2285523640240910792,3625310065548214147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1708 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2285523640240910792,3625310065548214147,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD53f1f6f5a4a663efdc27a6817a97234de
SHA135cf25c44e6739581f00d0bb7ef07d2e33a9e1d6
SHA256884361b4d77f401139015241cc0065a7236f5064f30c0c4fabdb17c229f0def5
SHA512738ef3b73c53e76f695e792062c6cebcacfefb8d336eebe57c4cf5ffb09f3d70a5c0fcfc53515406b375676bb06eadb9069c5912c2b2386a4cdb6b6747bd59cd
-
Filesize
6KB
MD5d19f3c1a73622a57bfed668a813e4b8f
SHA17f6f0aee306308c799e36b8686737aa6f8d6c206
SHA2560b48be3ed9e1e95fb51bf3d6cc59282f2c8c54cccc935703dfff06908f98a01a
SHA5128b52bd6c3ead9b670e70549201f7e5a14e8b2bfa7b78f9a3e400768e16dc4ea9d76caf49557631cb324e46e85c6bfdad246716479e664fda568aa20c98cff053
-
Filesize
7KB
MD533e6c27ba825300e3f167d0a3185bf9a
SHA1c5abf918383151fc1c9fa78586c6ffbd1ea22990
SHA256c7faf0fc9e176b580d00499d086161043dc3936c1c5b17448c576d61f117ad92
SHA51206d0cd5ffdbb81727609a8d6a45f388ae37b7df3c0911ccdee39778e92df9c8f295f6694a611d8937152ece2ff779b07c0e084cb2b218079d95e9b4045fd2082
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b94a1fbe-d400-4e99-8915-60880573cf39.tmp
Filesize6KB
MD5b7bab28d6fe618bdf58405b46b5b4168
SHA1346bd0d93d6907b8b9e8ace4105f03dd8b2de47c
SHA256078ee078e0442d87876f30211ceccd42d373a0ae9461ec689b6db7c8148fe430
SHA512006d24e616d5b671f096d5f558b0e94e479bb4b7fe2cd64ba0a3cfc16248e7ecc3e6b04389ece8f7f655827a29aa5fca7a9edadae70acfc951606491fce15184
-
Filesize
11KB
MD5ac35f2fb7210bdf96661aa7e99f9b801
SHA12e457bc98560c276b93f84412b377d76ccb1bee3
SHA2561b9071aa5597534d425ca3cffe29f5411c37b2ad3abfbaf6d171e9720fe7ed43
SHA5127aa04890f28550546ca958fc2d4f88650b7fc6807e34b82d51858f549f7c8bb37367726553d951c9046e6ecf22d2e47867cba966ecf59179589e7ad7353182ed