Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
3e63217ab6986fc38b2211608432754e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3e63217ab6986fc38b2211608432754e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3e63217ab6986fc38b2211608432754e_JaffaCakes118.html
-
Size
18KB
-
MD5
3e63217ab6986fc38b2211608432754e
-
SHA1
bf01eb5de775e59daa851c7aa4bc52c83f9b27fa
-
SHA256
d0433b9a21774ce79e7b84919692fcceb4efb0057e7f671613084057ac1dd405
-
SHA512
a07a77fd44e074c4d71041964206b3e602eea61a0f89577ef6be5702833c7b0829e1a6a8594776c5dfee109f61cda734e83e45f6515a895a3c49a0afba9bb70a
-
SSDEEP
384:5WActSxUUbgHRKx+uM2hfSapVseGElr8fa2M29kPnN7lc2V:59c8mY1lLHseGE242279
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 940 msedge.exe 940 msedge.exe 5072 msedge.exe 5072 msedge.exe 4364 identity_helper.exe 4364 identity_helper.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3140 5072 msedge.exe 83 PID 5072 wrote to memory of 3140 5072 msedge.exe 83 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 4856 5072 msedge.exe 85 PID 5072 wrote to memory of 940 5072 msedge.exe 86 PID 5072 wrote to memory of 940 5072 msedge.exe 86 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87 PID 5072 wrote to memory of 4540 5072 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e63217ab6986fc38b2211608432754e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff768946f8,0x7fff76894708,0x7fff768947182⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4332 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18178197874914199455,18221915437959107104,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5588 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5ffef76de437f8f720a00da1ac8dbefc2
SHA10b7c0f1a9ce3000926fd08bc285d6c0baabc3da9
SHA256bba5ec01aaab41bcb046600a8bdcb45880a4866195112856ea45a99ff283013c
SHA512fe6807ea49f86e3af945b68f8c22214b71a676c2f05796bd3f553228f0e785fe14e29fbbf47d9c7201bdd790bb66512e0960210fc7020d03e6b084bfc41f0edf
-
Filesize
1KB
MD51fe5cdb78a90e77714a696cbe8fc01c3
SHA17214a520fa17818fb0594233d8aeaf90cddb7fe9
SHA256a3b917df573df7197a90999bb829b333e2a2625ef933029571b81fba25adce41
SHA512449cb055bd3c16f15e1645f4ea06a2e2fd0872609831bf9e7ff1ba71c1918201571a1934f516fd59aa97736ff0f7bdd059b97b46908cfca3eb6daad386b6070b
-
Filesize
6KB
MD5d096aa71683a12ed3cd223446ddd1dbb
SHA18b746aafd7dc8670f6eeb1c23ad0ab6ad924351e
SHA25601587b2ddfd5dfec65e941b2959fc2370e22840106fa11edaa42453616b703a1
SHA512a436ba1454446f9867549615dac96f19e14323f2ba641dee1ae0c0010f946baa0435e7a2851b04db09383609fa5c870c7077f6a48abc230bd278ab19fbdc7da1
-
Filesize
6KB
MD5c8cd0ca827399835504418891e64160e
SHA1576ec3260c0ddcbef787f564f7b008dc69e6984c
SHA2566de24a14d56d816a15d4282a01b09c5bb385186bcb8c5a5aa58b031634d88a1d
SHA5120aaa843cd1103a44d96c3777718171964d741fb1a3bbd084fc8072eef729a58f2e2356d069237909d223f85f4c95ff65e6b9750bfdcc828611e5621f37f0ad68
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58667fbd486e26b3124b02e35679eb72a
SHA131945d92711c46407fac516dcc2346dcceb9bb27
SHA256c92ce6d5dde53e28bf1839d3068dc8d388970f868566349b1830ef4f4aadabaf
SHA51212da9462f2a96f5cb24d16ed8ff88a91107d6aad4775376d657142d7b09ea196bf807187e6376315e84d21dd713550e68ff3e1da03e895258c923f1c552d2dc2