Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
a36969343bd544a9fa6503ef31268377_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a36969343bd544a9fa6503ef31268377_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a36969343bd544a9fa6503ef31268377_JaffaCakes118.html
-
Size
270KB
-
MD5
a36969343bd544a9fa6503ef31268377
-
SHA1
3588550651fb485678170d2d3b347b2a4d43cfb8
-
SHA256
7ceab68a26c40bda06c5a49b5179a0b5ec915a1efb558cdfddc295f28934509a
-
SHA512
875889d894e5f6d802190469cbd2cd8ab15e07dc4b6df0ffb107757aa5b4090a1a604cc8a87aecc896ee2b312d085b0b1fb02d5f5af5ad3c796175b890641114
-
SSDEEP
6144:/IKfYeE+y630styzBzSzmPtocC20IusntfO8/3KHjtcI:gKw3630st4Pt9C20Iusntm8/3KHjtx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 3880 msedge.exe 3880 msedge.exe 3400 identity_helper.exe 3400 identity_helper.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 1800 3880 msedge.exe 84 PID 3880 wrote to memory of 1800 3880 msedge.exe 84 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 3364 3880 msedge.exe 85 PID 3880 wrote to memory of 4772 3880 msedge.exe 86 PID 3880 wrote to memory of 4772 3880 msedge.exe 86 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87 PID 3880 wrote to memory of 3608 3880 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a36969343bd544a9fa6503ef31268377_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe80f946f8,0x7ffe80f94708,0x7ffe80f947182⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1984 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:82⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7134025857360367022,2434430831595915848,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1360 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5ee8915991ada268034767350d49412fc
SHA173d8018ec5399300f9ab0ae4bbff4519a5d5d302
SHA256ae48ea89d11e0b3944b5f1bb17f4a2a6a925760a5980d2e3857f3b301b5a07f4
SHA512cd4c769728b00ac7af8b580dd5c936ff930bf6a16986a1c79f4631ea363791637b3748972f6ba834b5cde40125cdf50f6e23f637daed90e251853650625af31e
-
Filesize
1KB
MD5a3bc4a178bb5b4cf51e2962bda76e21e
SHA1ec4e74824996763d85791494320172bf12cb7565
SHA2561ab59b54f3f968d8ee9777c492167e4e89e0131424f83f38f457f95a54bbf02b
SHA512c482e1faefa51c674902e318d0eee2ae46a1548f5db4a445ef6e11f8e112694d03322e38dc8db3501f05495cb2774e65fadbf48625e654c3048064479f682657
-
Filesize
5KB
MD5ceedc1957378fe2410a7bf37f5e0941c
SHA172f699839d05f131503ae73dba323552eb7cde92
SHA256c350dd27faf6a3472d39a7240d18e8f498aa06659635fb22303ac9c07807bc24
SHA512036203e03297e03f1cfcb9c1bc8b23db331eca0a39e6f647d5aa2e9e9099360b583768043407ee5b9e5562c6eaf86ed04c2f52242e3836fa77692bf7e93d4a0c
-
Filesize
6KB
MD5b689f6ac84bab228a83470f3a7623f69
SHA13c285a7f1aecb7e04882dc42360c7817a6d8b825
SHA2564bf1e7ce2f502f755409bbb2fc9d1f3210f0d671ad707feac034a1dad7970d72
SHA5121b18b7fcc42b4d838f591e21cdc8e56c700a0b6ffb4bafd8783dc4ebcd5c4936f17700d83950167a51b48d443e6087c090537a42ae50de69c2298de5f6ff570a
-
Filesize
6KB
MD52ae5e18d4d660979994b711ecd945e4e
SHA1aae5d9648afd824ce687ed8ba87422f19fea2c06
SHA256742eec691fa9e8e2b8fcdefe522c1c11aacb7d212a45c4b59794ec92121f2c2b
SHA5126c8015e7f3d224ef167582d275667d51638746a738fe504deb69c72ebf6dd9fd36e714f087146adc2ef7ea513e682b48af946be50f3cd4a8d744d291c88eec03
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d5d718f06703f02e295fc22f94ddd55a
SHA12c0b4a1bf3c838a0ae84957f3afdce9e990a0293
SHA256617a0b892a4c73c9502733319f4f804beca9138a2357832bedfcbe500449dee3
SHA51265baf67a2adbc840f20001783c2aad67af5c1439938d5b6a4e5de6562aaf21b0c99a90a157ecc34b99f7b013a3b30baf67335240e18ecfaeadfc6d9003b9306c