Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
df06158af8b27329b8ae3e8400e1fb8d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df06158af8b27329b8ae3e8400e1fb8d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df06158af8b27329b8ae3e8400e1fb8d_JaffaCakes118.html
-
Size
18KB
-
MD5
df06158af8b27329b8ae3e8400e1fb8d
-
SHA1
ad76ae5a6dfcbfe76ab942c712cdcb9b3b386ac5
-
SHA256
7d7d9b4d6477495cf91ee673518ee8ed938eb36a490d4eb8b01c8bcacd2b8c44
-
SHA512
181609882668cb0201ac66fdbd4bef80f65ff304fa8bbd511f859dae317c5bfbec5091e2f44f0ceb600b2820cc0461a7a83bcb7250ea3a1c0064c3293879e1ab
-
SSDEEP
192:cwHPi7YSKRZKCmkBwnAlgIfjKPLWOCnDzRbKWf2bd:cwq7YSKRZKQwnAlbLKkDJff2B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 3168 msedge.exe 3168 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe 3168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3168 wrote to memory of 4828 3168 msedge.exe 86 PID 3168 wrote to memory of 4828 3168 msedge.exe 86 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 3096 3168 msedge.exe 87 PID 3168 wrote to memory of 4788 3168 msedge.exe 88 PID 3168 wrote to memory of 4788 3168 msedge.exe 88 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89 PID 3168 wrote to memory of 444 3168 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\df06158af8b27329b8ae3e8400e1fb8d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcff3546f8,0x7ffcff354708,0x7ffcff3547182⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17857990791219468680,11510707642245426372,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17857990791219468680,11510707642245426372,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17857990791219468680,11510707642245426372,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17857990791219468680,11510707642245426372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17857990791219468680,11510707642245426372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17857990791219468680,11510707642245426372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17857990791219468680,11510707642245426372,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1292 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17857990791219468680,11510707642245426372,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD584d8879ca5e99a5bd4c959adf5a23890
SHA11115bdc1ef5696ce7f55b1e8229f4240dca67c1c
SHA256777c01a508b2996bebe50e0e262b27d563fbc26568a12aa6fb12918ce856ed66
SHA512f43288afa823b810aaed493c3f1592bd4712e6db3e8e8a28441cadcc5869da6767ba3c81b7d0be3c8c5adb053e54b0cfa0494ad83f0810c212e778eda03a6d8b
-
Filesize
187B
MD58c61815b4672ea158dae25c7183fea93
SHA172e9ed7abaf0ddc9b6945910936d69fa448f71a5
SHA256c622c60c7021402826226596ed5dae70e071d97ad97308a41324b8dd43fa5ad8
SHA5123480fee3232fe288abeece82566eaafd1e4ec345206e47c9d8d71126a9b54734d5b57176405d40f4d2c7c4a89f40e98902aa633bc8450769a299a04797cdd929
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5b81cc5661e001feb6742c5e445e00a17
SHA13d7c616bbd6ccdc6b8b6fb384955fef6cb3991d9
SHA256757dc3cbb8ab6a4940a06fe3ab69be30d3e741fec971b61e9594070491d2d0ad
SHA5122c9e0d492ed638ce8bc6a3952fb737a9bd6868faf88ecad6133a4df951aa195d256f2f2ddc18325681e6a63ce1cbb1400f2fc64d53933b3b3909e47f830540cf
-
Filesize
6KB
MD5854a5baeda2a41f5a1e4be5a3d057055
SHA18fb8257bc6d8915a6ff688ac8da897e059b38d5e
SHA256d76386a185ae1c2ac9729ea355082dcff40b3f33a1aef3b3be55123a0c7ca013
SHA512aed284b1d2d8a6249d148a8af8f437c099fe1e112bdf0995e6fb7909b5c94dd8fa1cdb2830fc65b27026506e538b73a194525553348261f471d912d7303b0632
-
Filesize
6KB
MD52de8bb6bc8c1cd5fb82c2f3fa29884c8
SHA1ae3b4a12e6c43c4338998e768cb1d901222e9f0a
SHA256d7460d5d697b2983695d29ef18e11dddd136150181974d72098e7cdf965c1226
SHA512c6c435688ab9169206ba5629f497db1059ca54306bb20438b15a0b0397971b1bd461f7e72c91a5436372e5b3143e28412bf15ac6ebb90ddb8a818d1f650a223b
-
Filesize
10KB
MD558602949d1416e4bc5836a92b435450e
SHA1f7b38b5f343e36a2a7934c9aaafb8a452b812147
SHA256732c62b0c534683f1f5a4a94b34f3a912d669559e8112937ad359d7937fbe31c
SHA512685d95d1ae6263b5a03af7f5dbfd6c3f1193956428c396f73969f7583ad3eb47bc25274afb6c5f158bf1931b32d9fedcb72799289a90c1d7c23af76a622b6523