Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
3c880bd7987eb5f313ffce4bfd2855f3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c880bd7987eb5f313ffce4bfd2855f3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3c880bd7987eb5f313ffce4bfd2855f3_JaffaCakes118.html
-
Size
11KB
-
MD5
3c880bd7987eb5f313ffce4bfd2855f3
-
SHA1
421751c1a18c73228275028bd44659db531e33c2
-
SHA256
767a18aa21795d1ae9c2b4559e1a6c0f00e7feb3c830d6ff53f401739f3c84df
-
SHA512
c0c1dd1733e86019b920d2cf5d1db237a604ba1aa4eac049cf922847b770b54d5f74c538ce1c8dd88ffa4d66993ca017e6d5dfb039ef0e21b9a7cdbbc62c6911
-
SSDEEP
192:Sfqd9RDfYY1/ABxb7oD+6/O7YqjOFBf+0O0OEIOMXF7tn:Sfqd9RhKxb7oi6/O7YqjF0O0OBOM/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 4436 msedge.exe 4436 msedge.exe 3452 identity_helper.exe 3452 identity_helper.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 2440 4436 msedge.exe 83 PID 4436 wrote to memory of 2440 4436 msedge.exe 83 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2932 4436 msedge.exe 84 PID 4436 wrote to memory of 2160 4436 msedge.exe 85 PID 4436 wrote to memory of 2160 4436 msedge.exe 85 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86 PID 4436 wrote to memory of 4424 4436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c880bd7987eb5f313ffce4bfd2855f3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb87646f8,0x7ffbb8764708,0x7ffbb87647182⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14247405682960528290,10685100301116612554,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
475B
MD5b57ef16d4ce222637295f06822b8d597
SHA18982b216f0c340cd03c3c3b97dae76be396d682f
SHA256ecefea7769d7a871480e22029285980b038681b46d336cb311e6bdf63d279262
SHA512efd2aa26a3288b60c4799d84da17926c34e24122d8cf42601a0be9c57861d1e58717b0af023b8f2b360b4a26503dfbad4c8c31b35badf00c704a9c2125109dcb
-
Filesize
6KB
MD524c2c1e3df0505c2517da9070d84d6f8
SHA1d4b6e751247645baeb0a7ad41d8e8c39dcaa6262
SHA256ad887b7ed382729de4c3584641a35052aeab09cb5e94379c51a73cbc396ea2b2
SHA5127bb440c67c16a6bb805a56576384b11cdc62ba2160cd4ff55c5d20309216a0909ea72d93beaada7577b5a9ce2ab5ff83734b146ebb8caaaee818e684f07b29c2
-
Filesize
6KB
MD5f21b6abfe90ec3a8dbd6545f6a251f0d
SHA1deecba6123cc56dc591a06b3daf05298ab1af553
SHA256e24a1dc43410cf4b0759205b5d17c010229c642f961ae4c9ec3c6d2480081a8e
SHA512d5362efcb28a7b821d0e2233e9c07c5a514cbd747e1a366ea658ee40cb88dc28cdb538fd305d02b6e77413dfa2df171723e55c1d4f4197cec9143fd2e025cffb
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD50e6dd6fa635e618085bdf9e89aeeeb18
SHA1b7aa9baed6e77bb4257238df58079ebe1ae43eed
SHA2567d0ac9e45ec5bdee3d0818a1ffbd18c7f78183c375bc1629a564718d0d0aa09d
SHA5128685d74d1a8e542331d63f1123a6fd65cf0cce0fe391ccb1e81c3ea3b7af9f26a731db22f2d4cd3ef5a1a21927570bf288ca481f0183d90b01087a281b068c56