Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
384c52ab9c30fcf1edcb730e2d65eaa6_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
384c52ab9c30fcf1edcb730e2d65eaa6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
384c52ab9c30fcf1edcb730e2d65eaa6_JaffaCakes118.html
-
Size
42KB
-
MD5
384c52ab9c30fcf1edcb730e2d65eaa6
-
SHA1
b0399cf0eaaca713f69a3a6f881d978cf549b034
-
SHA256
19a79d2a088834ae872c1153bb6068fe98a170ee31f9f3985cc6e2fb873733f8
-
SHA512
6d6205121ebd89dba096a85baba9301b7c0ed2e47d82fbc09cef6dc877494d40c247139bfb7728063f9a389585fa78a528f81baff219ae844f7071e2b26ac7b0
-
SSDEEP
768:Xi1S5y5v/eA4W5l89CsbhzSBn3BHGxwfkvc0GAVHRGBpBoBmBzB2B1B24NMtWeNm:yg81/enFdMtWeCr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 944 msedge.exe 944 msedge.exe 1512 msedge.exe 1512 msedge.exe 4672 identity_helper.exe 4672 identity_helper.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2740 1512 msedge.exe 83 PID 1512 wrote to memory of 2740 1512 msedge.exe 83 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 184 1512 msedge.exe 85 PID 1512 wrote to memory of 944 1512 msedge.exe 86 PID 1512 wrote to memory of 944 1512 msedge.exe 86 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87 PID 1512 wrote to memory of 888 1512 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\384c52ab9c30fcf1edcb730e2d65eaa6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa302e46f8,0x7ffa302e4708,0x7ffa302e47182⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2444 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2488 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11100565371272097437,5123439264847274281,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5620 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
395B
MD500acef93b26c2018803c410b69aad312
SHA1b67b3fb32a54e3caf9738bbf9c7df13e186281f8
SHA2568e2760d3479854876eed1ea99b3cbf6e56e82f49cd050719dfa1baa36388e678
SHA512cb0affe3df4ef47302d961e99ce34e8de7702ccb6475aae079f27ed75bd4f1789eebb50ca18eb31674437a66b4ef8f4c7b7e32639f7deb31163288d13c65694b
-
Filesize
6KB
MD581ac8c3dd3b9d763559fae39f410bc4b
SHA164527e9623e1b30939bf25712eb0c512d5efcb97
SHA2566665629c9811b8d64c4105be2aaa8e5a3af7780d372733938a47b27fc86e1138
SHA5120aaf9b56c772d50625d84fe25b9612703c9423714b7e40644cc15483993f0b16cd9e987e7c1e83102c6abb24ff2767856bca2e0f86955b529ea48534d06a02a2
-
Filesize
6KB
MD5adde25eaceb3751f7a2f88676b073acb
SHA1ce3fcbf11366c546a9b35e8f1c0682244801a71c
SHA2560725798bd46497005ae350703f4403a9803e11dfbbdd4900ab2a7ada0c37f8ac
SHA51215208d043ef242a338da715cc4e3d1be4957da9889e73f4ccc5b7255c0e0d028daebb2336f75cddbbbbe7ffefa8baa93682ba76ddb4d9c124c296aa655521412
-
Filesize
6KB
MD545b740bc4371dd66534eda509a8c6f6a
SHA1bcebdf59c2492c9e3f16f51a83dee3a3ca278f09
SHA256414d1194f4aa6bf2ccad66aa88e3009af3b01fbdd597e12fde2ef4de18a76dae
SHA51270073f0a0c39f7c25a4c7cb6ac8ceacd21a1b82800897d3fb5bf2b119d1a787a514b5e350cc5ba2be55f2953e003e9979bbbe44f727d0d41b966b15ed4170621
-
Filesize
6KB
MD599ef2cfcf60a6e59e1bf1ad2423da5a7
SHA1c465c614e9bcadf3c2fc84b29949ee54742b1c33
SHA256e20a026863ad310e187f8ae0a069ab24b32c07aef046746ce86541a7943cb37f
SHA51238ca62fae3e6a3a9f871ff6b039247579d80fbf3157472a2d61a16edefb8aa26c18d08b4776a18e36b7b6eb4636c1f978696379acfdbfe1e2ce64a08896d6d6f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f9dbcb45-0faa-477c-9fdd-dca6d1a71dc0.tmp
Filesize364B
MD5f9a9b311e0fdef8572c66d4822a7fad0
SHA1e245ad77e6aecf38fdab542649cfeecbc28da434
SHA256ea4f9374512f8161a60a3be914ae0f2fb04350d67cfe4e2d560804c100dd7c96
SHA51297b0a45c340fbaa5298e818e7b3d9f024272a31d33536742e53c9edbebd43f747c4e4b7ab2d2ba33a88c2f879517c90457454a1bccf9cbaef99322c6089996b8
-
Filesize
10KB
MD5faab3aa098f6a2129e3f4ac9beff3b3f
SHA1090d50a2793da97191b0b457976850dc180f082f
SHA256827cd2a4592c9c68489e989391fed9b61239b17ae86aef80d5604766d2bc8c22
SHA51242db46c5c82db23abafc2a693d1aca9eff516f54a81d72b24ca55386438b63c33d42d55e8446ef4b4fd2ad1f9a1210fe577e57ab2a7ad1cd8edcfb4aa3254197