Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
38980078da46e04666b556ee3abe9a22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38980078da46e04666b556ee3abe9a22_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38980078da46e04666b556ee3abe9a22_JaffaCakes118.html
-
Size
71KB
-
MD5
38980078da46e04666b556ee3abe9a22
-
SHA1
91cd24e3154cd46f738c72e9dc62687fcc3cd124
-
SHA256
68d2881d7c509490a86e209e2606d9c9680a5306630f3447f94b3f8a51d60d2e
-
SHA512
2a8e85a1b2a760662ce6d30017f4d4a0470da06ee7d9ffad1ee345ce0ab8f024fcab163cf5ed459a78282c865741823acf7704f84225b33c3bf4d0a2c05ee913
-
SSDEEP
768:SW0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/Vu:SIIk//tnwO8Jmhucn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3476 wrote to memory of 1680 3476 msedge.exe 83 PID 3476 wrote to memory of 1680 3476 msedge.exe 83 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 3424 3476 msedge.exe 84 PID 3476 wrote to memory of 1692 3476 msedge.exe 85 PID 3476 wrote to memory of 1692 3476 msedge.exe 85 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86 PID 3476 wrote to memory of 2108 3476 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38980078da46e04666b556ee3abe9a22_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93b0346f8,0x7ff93b034708,0x7ff93b0347182⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,15670421138611130426,12104090617300671931,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:22⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,15670421138611130426,12104090617300671931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,15670421138611130426,12104090617300671931,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,15670421138611130426,12104090617300671931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,15670421138611130426,12104090617300671931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,15670421138611130426,12104090617300671931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,15670421138611130426,12104090617300671931,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 /prefetch:22⤵PID:1676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\73ea109c-31db-491d-b3a6-de1ee9f89a1d.tmp
Filesize6KB
MD5065ff7720692ea6592d62374b4735604
SHA1a662d973c41a9b5454d2e87fb31a0a66a5a48777
SHA256490fc490e8b7ea8b943cf6d1f6aad803e6e40754dd9e04b3e8d0834f6bea6c16
SHA5126cc045207308bb7fe5f50a4e382ba607d8ae9c7587f81adea0254de42b02f2f1de5a0df77bcabbe625a395284621e254bf112855d4c091c32dbe972e4ef24d3f
-
Filesize
6KB
MD513a73a12e52f2fe5772eabf7487b4e38
SHA1719ee5420c23a129ce200c3177649fc646eee7b3
SHA2561fdb573e5ca68eed2ac2d6d1fc593d5819f4093de9da19fba244ebe7a371a5da
SHA5129d8d93de58dd20ee55f13b33bf1c248e5927c0e2f4673803bd5ff318565c04dbfbdb92dc81b724dcfaa54547049c977a20e5fa48411c65382f983336d7a074e7
-
Filesize
6KB
MD5466a2a5a65f521eb16abaa0b05450d56
SHA1233a7f406f046c9d260e68a4aa043b11ac844860
SHA2566ee61acdccdfdea4116e03fe303b70009dc7fd8c26cc687de5dc99b5dd3c6299
SHA512792151b5687010927bbd82384f101ff78e206f2fda0d020feaaa059f8e80c2004bde533a5f0958e32d025ebda60fee33802b2ad80ad1d6014d70979aeae4eb6d
-
Filesize
10KB
MD50f8c496c4ac00e8c1f12a6ef640e90ff
SHA1c5702ac98078ab88ab74ad27a599903ae2c98d69
SHA25686bdb4d2d90d7f574aaeee4c7952db72440f93232dffcac474d0f74e81882fa3
SHA5122ccbf2652f4a632d02a8973d5a3b93e94664771201ee4d441b9d227a2466a0f2683061f18204ba2592d7b3b00eb138d9602cc18d1a7db4b67be158ccb961dfd2