Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
380377eac56f274d9ff0f733615cc3f4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
380377eac56f274d9ff0f733615cc3f4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
380377eac56f274d9ff0f733615cc3f4_JaffaCakes118.html
-
Size
11KB
-
MD5
380377eac56f274d9ff0f733615cc3f4
-
SHA1
780b6833f60bb06ae71c10daa265e89e65d75e00
-
SHA256
9d8a8d6d474940dae9855638fa9c172b17f2e6c7964f2adb4618804e8bf4748b
-
SHA512
82de33091e0c940c305550d5cc9989393c57e6af2339d4105aa20275fd91c88b3596220a660457a34fd490db7927b1ed018db3148ce58db819cf0f9dbe34a9d1
-
SSDEEP
192:2VmlIsr03G78k/w1wvqyzB9Ung/C7Yj01pgOXuBuLbdU8d:smlIcuGt/gczB9Ung/C7Yj0pgOXguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4036 msedge.exe 4036 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe 4036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4036 wrote to memory of 4564 4036 msedge.exe 83 PID 4036 wrote to memory of 4564 4036 msedge.exe 83 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 3460 4036 msedge.exe 85 PID 4036 wrote to memory of 4860 4036 msedge.exe 86 PID 4036 wrote to memory of 4860 4036 msedge.exe 86 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87 PID 4036 wrote to memory of 1480 4036 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\380377eac56f274d9ff0f733615cc3f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80db246f8,0x7ff80db24708,0x7ff80db247182⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,13624014012391052722,12297607671340823349,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,13624014012391052722,12297607671340823349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2584 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,13624014012391052722,12297607671340823349,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,13624014012391052722,12297607671340823349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,13624014012391052722,12297607671340823349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,13624014012391052722,12297607671340823349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,13624014012391052722,12297607671340823349,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD52c1c87fdbeb23c7c92bc47f30415b936
SHA12b686c4b3d0e2fa9b0ae8899de208667a122cd66
SHA256b8ce7ea8100aaa4ae60a3b91f96304e99564959701c264198ae6ed96e8a5d333
SHA51204912c79a992ffe1a7f28a923ac8c9883f461941b14d076c689d7237f71b303eb1e06ec118fe028b8175e4d672510480061d68e1e16e860a80d890e054698a3b
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5453be00849db0895ad341da61c605364
SHA13880a52c3b93e003f5bd4789200ecc0b6a05f500
SHA256cc84147367f7dba2dcaf9e450447462eb46cf798087565f1b68528a9ccb1e5fd
SHA512ffad6c4e24c813fcccc3bbae80381fa933dc02b525f89a11be34d9ca784ef11f90beceb3200c0882de7bd4b79bb8f85679a399720b615aca37af919c72865e44
-
Filesize
6KB
MD5e2b362c85c79d6160c5372834fbbeae4
SHA1e6e7188b35fc0899d54258d7a89bc0f14497740b
SHA256184953aaa758cbdd40d292f2db4a26dd944189edc0841e2d795b939693d530e7
SHA5122cce13e95d4887efebcf0426ca1c395d4c3b5058201e3001e4736697f3dabaa6ae10e5b6d1fc6810ec1ef1f45d5d99fa747b15a94c488f86244db4682a4d7d72
-
Filesize
10KB
MD5ee930015b2817433e11f63c4c9ef33e9
SHA1ae9f4a6c0151664ff47a5ded545b681b4ffdff59
SHA256ed820fe633e9e17c6e2e1c373e70948aeda5166046666f65c3391c59e23164c4
SHA512e03dc2436469682410adec3f1e13d24e405724e138466c5d7fc75568b3b00772454ab9d1759c2b827569b23f5a7e6b42e4b2f1d34fd8e92daccd38574b0b4994