Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html
-
Size
12KB
-
MD5
06c9294a7e3f54f6d6b3cbde19d3c66f
-
SHA1
95fba29693c5b32ec3ab72f5330abdd9b7ee533e
-
SHA256
9e9dbcc5d6060cf5cbae892785b8ad732dc4df3cb67989e8d7d509b1548a229d
-
SHA512
14df7e82fec8d1be17eeda2ecb8b6f429cb3494da67b8f175f09838d27b4a0fd2023e8e58475e6a8443a7424f084cf0fa1bd3cd47d8db6499175d16c2ebfac70
-
SSDEEP
384:sElIcMVfjGt/guYB3Z/nNYeFy0Psw8guLZ:zg3dhkxLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 4532 msedge.exe 4532 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1440 4532 msedge.exe 82 PID 4532 wrote to memory of 1440 4532 msedge.exe 82 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 3296 4532 msedge.exe 83 PID 4532 wrote to memory of 5088 4532 msedge.exe 84 PID 4532 wrote to memory of 5088 4532 msedge.exe 84 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85 PID 4532 wrote to memory of 748 4532 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ff91f3746f8,0x7ff91f374708,0x7ff91f3747182⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15024305113138036216,14386996863836888023,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15024305113138036216,14386996863836888023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15024305113138036216,14386996863836888023,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15024305113138036216,14386996863836888023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15024305113138036216,14386996863836888023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15024305113138036216,14386996863836888023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15024305113138036216,14386996863836888023,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD53f6945bdb3832d471b595d44c98ddee6
SHA180ef4a3ef16bc8f7d46a9abf50ef0f1580ddc4f0
SHA25607cbd4a2446c61505ffc9b69bb9f7790ab0189c638ba48a19f45fdbd67837736
SHA5124c7bb6347c0dc7a9725b7e74f9d41133d40900f60dbecfa761245d65fbe4a0dd48e9d3e3df10d1b240cd97de3e23eb4375bf92d7591fcf6e878b3f1e6e7cba77
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5506b6bdca8cfb462851d99f9081842e1
SHA15d80523dd2522d5ea802aeebaa171d3961f38f18
SHA256c478ca31df1c28b7d2451dd80553d96bdae65f255bac782cff0d1c59df53e613
SHA51252fb09c7f8b304e330a6dd97cff1a806b6ed12382e4de1b7872c5bd1c3a91931e4b66c2d91f2be097abaefc0ce8e52d809d81d35d542c4716a69ebf283ab6ac5
-
Filesize
5KB
MD562c0c47ae5974d0fb6731994bfbf9b12
SHA1c3219952e0175bd63d367d5cd3edda6377eb78f2
SHA25613852f0898e08b790a6a7f0b787d944f2f5214d349e013cd3afcd0e7dd004594
SHA512bea017867370930325368007eca8ea72d4d8d87029ec8b8396d70e3d1fb701534a274d279617de0a8d4a6dc811cb83dbd25c869fb1b3f8f0d9cfdc171f101ce5
-
Filesize
6KB
MD535ac974b82543ddc211a62dfa033338b
SHA15037c75ef65c0a98145fb947597b4ace51fe4c72
SHA25651b16ea5cf6d85268da542d710f88c79aa892bcea174ff653a67720b5e4b7ad6
SHA5125dd51e08f5036a02838fd4e747c2a814cce7f1f61015b8d44ac7014d9895014d44e526ba4d4d2ab422e74da224c60a310f0c043dc9243675d3f2e453adb958fb
-
Filesize
10KB
MD52207463f0814b55942d03fa16d491d3f
SHA1335745e6825a75fde6844dee1c93c8d3b99fab73
SHA2560e263c72dd24e027e9b113e6ee857489836fe4a9427fd0d42a823fe197b9b8c1
SHA5122203bca7a668ab4d43d04d0882e42997a58882ee3b130b4bd8a4bb1e5750241173ecf1da229c3303fc7db07bcf413af73bd544629a5b9c3e79a7397ef42de6e5