Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
36e79de3e264a8fc4c71baaeb411559f_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
36e79de3e264a8fc4c71baaeb411559f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
36e79de3e264a8fc4c71baaeb411559f_JaffaCakes118.html
-
Size
1KB
-
MD5
36e79de3e264a8fc4c71baaeb411559f
-
SHA1
57bf0453f65d797c78a75c7aea8cb1f048a8e195
-
SHA256
b850ac7114e06c2100849534395a7ae9030843a8e4d02d2fbb702ce2da051cca
-
SHA512
cffa94b8d24eb0c7c1ab0012b02a99db330a9713d19bcda1c35f1204d529ae2c88bf32dbb8e58f8d4339a3f8244d0e10e41e85ee4681a4ff8b42a18715ba2847
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2208 msedge.exe 2208 msedge.exe 2228 identity_helper.exe 2228 identity_helper.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 228 2208 msedge.exe 83 PID 2208 wrote to memory of 228 2208 msedge.exe 83 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 852 2208 msedge.exe 84 PID 2208 wrote to memory of 2036 2208 msedge.exe 85 PID 2208 wrote to memory of 2036 2208 msedge.exe 85 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86 PID 2208 wrote to memory of 532 2208 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\36e79de3e264a8fc4c71baaeb411559f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80d7746f8,0x7ff80d774708,0x7ff80d7747182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15580056175300327881,10858081607021284590,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56f7ca56a8a5015258058a8f50ff05ef2
SHA1d5597521cc811473f1c90a20ba0786b8f650af94
SHA2562bf255ec3fa8a5ded9eff530aee306a84d5631063421b958eda6f9a7676c0f3d
SHA51286f0093e14c07ec3f911e2831143e3066dd98dc5746ce5fcffae0f08de9e0327ca64591d90ebec99905478b7403fec04a5eff6fc6b90baa91a104123d453160b
-
Filesize
811B
MD593a4f65ae02132c5bdab796dec947533
SHA122a56cbf4f8548eb5e049d96c7b3a8cec6db16e9
SHA2569f7be841212931d29963276d4ed092dc60030135789ce9e6aa8271f3a427fabd
SHA5126febe3eab88edc3cd6ec3ce2e5656508891e1b7ac04635fb9bc022307bf1ef989c88f974dd545971768ac43cd23c47e38a3fbf99192138183187d810fff5f951
-
Filesize
6KB
MD532ad71e70bea0fd0b9cfa34e907771e3
SHA1617b888aaf96d1f0c913f5220a92d406f31e3598
SHA2562820a6d9346261de4edbfd954426393e0cb26714245135945829df0ec08b80f2
SHA512c147e6e37252920662a76d3946b4d69e1eb5a16b422f5007d1a08314293b3370f37c0109cc9ace66266c13bcb90d0691c94c3daa7602bc633f35bb0f20610fda
-
Filesize
6KB
MD5591621dc9012908110ba40cbe62f8414
SHA1dafda030920b912c6bb4404b6b77a86e76857e6b
SHA256428f9abc422a99b3c9fe8a831c2523abab27173d18e34961d7e4f8bd8d9d6c1d
SHA512a9bc855b4cf2df7afb52c00d96bdda62b26f329b1bfac0579ce73da084b7055946e491c7ed17720ac0eb59f4e5786b3ce5a724297f80f235be21dbe1cec1d160
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e372124ca2e68717cdc1b530f05be9bf
SHA19fdacdf3d79b8b73fc3e3d642d3145bd79e81b24
SHA25646c690f5298e4ec10ad4f3962a5c5007bc941e95aa7c4548e205509587f8e3b4
SHA512dad81ee0e7fbf977669b400119430c3a83b6f2280b2ea1354340dea4264a9cb71569386d209bec21509ddb5f6987db0fcc8e27e0e719a085db5435ca68aaf1fd