Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
36e49e91ad55ab1af6d4a8d6437786c3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36e49e91ad55ab1af6d4a8d6437786c3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
36e49e91ad55ab1af6d4a8d6437786c3_JaffaCakes118.html
-
Size
19KB
-
MD5
36e49e91ad55ab1af6d4a8d6437786c3
-
SHA1
71b6a42b35482201d64a2ecf92320ba9e37e3c3e
-
SHA256
9c30b8f8ceaaf446ac6a44090ae95014f61f66ef870265d167c4083af47462eb
-
SHA512
8a7ccab3fd18e1125627f4b8b48345da50444cd6ac28e27022f3f6ce4a800813362041a273f93917785dab4318f6547e4c886322c01cdb992716a9ea5fd525ef
-
SSDEEP
384:4+QfPFd9QZBC7mOdMA6tKfpC5IgSnbmFe7Acez6FeLAPd:Zcd9QZBC7mOdMAvpC5I9nC4dPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 3904 msedge.exe 3904 msedge.exe 1236 identity_helper.exe 1236 identity_helper.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3088 3904 msedge.exe 83 PID 3904 wrote to memory of 3088 3904 msedge.exe 83 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 4052 3904 msedge.exe 84 PID 3904 wrote to memory of 2916 3904 msedge.exe 85 PID 3904 wrote to memory of 2916 3904 msedge.exe 85 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86 PID 3904 wrote to memory of 3260 3904 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\36e49e91ad55ab1af6d4a8d6437786c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbd5546f8,0x7fffbd554708,0x7fffbd5547182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6232 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11629567641964784271,16571076895815158153,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD517753b443f8ae33ed42eb46658ce1f53
SHA14e1090ecf2da700351ba5ce3348448dfc07ac9eb
SHA256f5b319d9ea05d77bc429a5d1ff7e980678a33eaf4c26e5b7f639267f110873fa
SHA512ae486cbbb7593b5ccb1350f51e3f2065f22f6fbf89515d2769d372cadf95b25acc6278bd539be8049df4b675c58a06910e111919f5f0001fc455265b94a12514
-
Filesize
1KB
MD5d4d08bd5694b8807c7070229e1af5c0c
SHA1b541ff8be30b9004fcb25357bf86c2bff8a827e1
SHA2560d1a1fe136377789deef423040d1a1a2e5ea14167be22cc7fb5893edfc50aee5
SHA512dcc957140463683db80d380fbaeca6094e974fcac9df0d53031b784bce68786cd4ee73d4f7ea508145bb664650efde4a6ec3a71b53fdd2589ca08c261a82552a
-
Filesize
6KB
MD5b44b82e3c094b3865413b4d4bfd63ffe
SHA1717c4cdc51a396a9b0be3b24f29425c1c7604e29
SHA2568dcba46d12435695a00fb755084a9b494e5c103a8602b71cfaff93b0091f480f
SHA5123f042686199922436a222050335f524f51a1f0e17705b846feb0493b427e10baed6a309b49cc771cb9e57d10a7855535ae07051ad3697d87f8c6f14ad2f1b981
-
Filesize
6KB
MD5b737216f939467277391e5a25d7bebf3
SHA143bd09070fb43d43278568162db3061ea9b306dc
SHA2568210a212f171ff019a4d8c2c551846bab0fe9adaa557900973b41ced649dec9b
SHA512ea650dda55e493b98df362d8699bb6bcc27f3431c454914f6f265e028da006243343d493be8cefbfe3662b351552e046deddd96b3481f4a5b4fdd2f7087a9fc5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55d1d350507906063c0c429b6b077259e
SHA114fc9f1158306c4862f8338da0113faeea5a57c6
SHA2566e6e388e67acffee580b0e4dc4509d33405fad3b2ddcbc5d2acfccccffca66ea
SHA5127ce2c0d77f0c0a24b8210c0cea57a20e6c5dfc66b8d481b76ad527b7e142302644c53e7ecaabbe82ad678eb0f630634cb247d28ed4414408b09327ddebdc19ba