Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
d1184b77ddf664cbd9f4e9eff39a716c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1184b77ddf664cbd9f4e9eff39a716c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1184b77ddf664cbd9f4e9eff39a716c_JaffaCakes118.html
-
Size
186KB
-
MD5
d1184b77ddf664cbd9f4e9eff39a716c
-
SHA1
705ca450b7ff8e7410723136e981424a7f59953b
-
SHA256
494dc080d97953b0da749a70c744d617eb4481e178240dcf8351fe4b6d4a9d15
-
SHA512
2c604da5674894d2f90d98843fab45be1b8a4c85759d8cef50bd2e9f7857d968f011691e8c160b2a195b46bd3f0a88d6f9548ca5d628f17331d3885eb6425cc1
-
SSDEEP
3072:TxDNvG8rm/GXmNJUNBVTRQUe+EConLIgVWyHb/th2wpngwDWDRan:rVXmNJWSn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2988 msedge.exe 2988 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 4532 2988 msedge.exe 83 PID 2988 wrote to memory of 4532 2988 msedge.exe 83 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 4640 2988 msedge.exe 84 PID 2988 wrote to memory of 2116 2988 msedge.exe 85 PID 2988 wrote to memory of 2116 2988 msedge.exe 85 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86 PID 2988 wrote to memory of 4796 2988 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d1184b77ddf664cbd9f4e9eff39a716c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfe1346f8,0x7ffcfe134708,0x7ffcfe1347182⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,3689700982769814927,7459249743914195361,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a6835d31f39f44285d031ae88dc656b8
SHA1b5b9faec238a3dd0e3836ad20dae5aed46dc19c1
SHA256731c53eaff8b95ec682082efe45a8732e248ca097d77fb818f0ab12f3d23a67b
SHA512752ec04aa8130258bd3d94ad4a471403d8c39a3f859a527f0f523020b0657e9947a69aa5ebca2d4cbc9e5c385a864273051118646231e49fef74f55fe0ed2c88
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5523c534b0acb0e240e9152dca97a150f
SHA1bd89015f052781120c59d81b19f4a3be2a61215f
SHA256fb48f7a74be2f7df6352f23bc029e349300a981cb187c2a22a1ad374097698d5
SHA5129d50c74f49f029c4ef19cd9820b6bdc08a0facf02bfb3a3750ed9ab586b13fd2a16a48ecf01241be4a7a8180d5a7f8cbd2b227e55b1d13c9ac5e27885775dcf3
-
Filesize
2KB
MD5e2c22e25b100fef62186d2adc7249bf1
SHA1c850cc791fddc91a74a3ec3255bbd79fdb3eedbe
SHA256612305b2aefcce66c160514a888353e5c1e1871f206737d9b7ff97e89dcd119c
SHA5125010c9c8d80c338a836af2e23e2bc04e38043b2a0c4704d43bce940f3b682421dd421a80b3ad5c870e56f3d3960f37d2995aa448c5eab452da283a66ada89914
-
Filesize
5KB
MD57c24554bc5920feab5633ef8c392a9b8
SHA1e4f8b7d34307f4f1d23d8cd9134015ec2039f269
SHA256dd814bef6bb50ed399ac715c92cd58ddedc9a719da432ecb6264ba4500faa5d2
SHA5121ed569b37728d6ac36fc9de84592d009dcd07762ac2103fa71b143f5e77fe173ae5988cb7b2eb20c73178136e1432d08c513eafb2bcfdcb580744b6131049495
-
Filesize
7KB
MD58678914e6b075ec02b4dc1b2d432fd70
SHA144e8f5cca579e3827812c5509734d380d62f539e
SHA25634ba962cb4996d6614f414b871fc7eacb5607b6285c62266138ed94276a4bce2
SHA512f352b8894ffe7935cdb23170f6fda1e273c3605e1c490cf2c3ff7f1121a50bf55bc7569cc1332c249da877915b06c37883f9ee3aee41152e2d029b294b469150
-
Filesize
10KB
MD546b08e97b94551df4086e51b9478f72a
SHA155a13c5c45f864719bdb84194d50971a9fff674d
SHA256c51e4a099d90db2640d5922450787d713857a437911d9fdca69e014f7302e2c5
SHA51288ce7dc8c931e5eb79926e66a96bbb5bb0d6fc7360ef245577d2689a80580358337321d69b4c59b3210fa08f54606a0347cb5ce3c1e49333e025a4af71786884