Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
d6535cd53cf14b5048e6f410d0b4e3bf_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6535cd53cf14b5048e6f410d0b4e3bf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6535cd53cf14b5048e6f410d0b4e3bf_JaffaCakes118.html
-
Size
1KB
-
MD5
d6535cd53cf14b5048e6f410d0b4e3bf
-
SHA1
65be327a8fb393edcc8cf4109ba8eaa6f3de43d9
-
SHA256
dfa856f63e4a07e2726305fa7eaf6f42ae5a471b74dbbcffc8929eb7df5d5758
-
SHA512
3b506e0a494e6d5ae8847271afad041080b1e9ba8e1f8b0357035c3e81450297ea6c7fd78de63b9bee3e8ded56b1bb9398b9cda74414700c49270c0c551b7ca1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2508 msedge.exe 2508 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2508 wrote to memory of 4460 2508 msedge.exe 83 PID 2508 wrote to memory of 4460 2508 msedge.exe 83 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 1052 2508 msedge.exe 84 PID 2508 wrote to memory of 2796 2508 msedge.exe 85 PID 2508 wrote to memory of 2796 2508 msedge.exe 85 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86 PID 2508 wrote to memory of 3952 2508 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6535cd53cf14b5048e6f410d0b4e3bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9723d46f8,0x7ff9723d4708,0x7ff9723d47182⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5946626744885244157,15314488361152393806,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,5946626744885244157,15314488361152393806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,5946626744885244157,15314488361152393806,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5946626744885244157,15314488361152393806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5946626744885244157,15314488361152393806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5946626744885244157,15314488361152393806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5946626744885244157,15314488361152393806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5946626744885244157,15314488361152393806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5946626744885244157,15314488361152393806,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53b0d24b5d9f03f527f786d34448e4e4d
SHA1892e783b1931a01ae318913acede7c51a2b4ed27
SHA2567db173f3831ec84c6333a518080adba5229d77721f3a87ce1d939379a2027b4d
SHA512468f03c8fff7467b6b54b71a6768930be7e8af97ff11b16f785619535df7a95da025861f57620d003e2266818f1aab4d903a69c8f52783ab380b305279246a83
-
Filesize
1015B
MD5e29fb42dac2545dc40f567ab514fea4c
SHA194663930956dc863e8ec185932d6904d16109bf4
SHA256a2b1bab0638dd07637b97dc5c566d963b9bc8e3e704dec671426fe7e138628e7
SHA512a341e60c5fe78668c1932174c60d5acda501c620cc50847fbfadece3a2b867f78db8010145abcd621b82720032e02664d542070e5f8da5fe783f24e8637361e7
-
Filesize
6KB
MD57891d10df6f62d0acede3880acc1931b
SHA10d9bf469a70ffebda9879560172f3845945762c2
SHA2566e3f317c155050257a37b74d4a72d57a4239cf1632c3061c9aa7ef8610b4e14f
SHA512fc5773ba16b4599110360e7c91cccddaf6f590d73bc524cfc12cbec475e38de4fff58cace964b27a36f17e3c08903dfaad5ae1cd86c58d5bf45e7bb31ff4d8aa
-
Filesize
5KB
MD5ba748581e61874ea6fb357af28549860
SHA1b878a1aede12a44740a9bd60fbc46ec5ee2689c1
SHA256201df4b666eb7df49843ec107ec48a8f547b8b415ccf1b50be24b5d0635f695c
SHA51203f9066f857224cff5db2ebeae1832c48cdf064b3903a9ec453ae0a71b9fe266758cb3ab19f5928ac9d6575a383b1b6fc00f8c84a18d591ac76187fe3ffaaf38
-
Filesize
10KB
MD51854d2f736a9dc1776ef202ef7825a05
SHA17374ece80a7b8298559679573df8982f78e0bd04
SHA2563fce3d49505feebdefebc19357c4aa8838585304e6f6efd958600e73ef903630
SHA512ed0f90eb980d00891e392a334e37d1e7b46de90783066e6b86ef7ec6b11ba59c5234b83ef0caca6ce89864d36572fefbb1888487176dad102ce2ef50a85e7d66