Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
3b1c536516d909946b6b93e6ae943a73_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b1c536516d909946b6b93e6ae943a73_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b1c536516d909946b6b93e6ae943a73_JaffaCakes118.html
-
Size
184KB
-
MD5
3b1c536516d909946b6b93e6ae943a73
-
SHA1
fc2104ea5cb4e16bea26353913891dfc028d030e
-
SHA256
2b408cc8c254e420825bc4be9de4b2660b782c8eddb819bbfc1959e095b9ecc3
-
SHA512
8992f05f2485e68aaef833d7b9dcf4ac5ec91382988dc549eb1523297040f12c538822811842566c0f5c8c49b26db0e94685dfd593b924fb15bbefd0dec0080b
-
SSDEEP
1536:kIVqgKAuBNhDgKAdyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:kIVDyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 852 msedge.exe 852 msedge.exe 4296 identity_helper.exe 4296 identity_helper.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 852 wrote to memory of 4800 852 msedge.exe 85 PID 852 wrote to memory of 4800 852 msedge.exe 85 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 2972 852 msedge.exe 86 PID 852 wrote to memory of 3028 852 msedge.exe 87 PID 852 wrote to memory of 3028 852 msedge.exe 87 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88 PID 852 wrote to memory of 1020 852 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3b1c536516d909946b6b93e6ae943a73_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb439c46f8,0x7ffb439c4708,0x7ffb439c47182⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3772845060106245923,6433571136921183685,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD5a5d7f69d555e97736baa39441703d88c
SHA1dd60faacae20513984b899ca9ca42438ad6395ff
SHA256d707c282dbd8c29bfb0cc484723f6152e0f6219b44e19b8b38918de78647fd95
SHA51223832f58f7ffd42ed4bca79300a142065db18b9f0ae395c05f9aa64781d9f1d98af39566fc469091a362029e52b0445325b81ac8c9f676d37311c664bb628713
-
Filesize
6KB
MD54f051f2efcfd8eaefb7d7c1bde5fdd36
SHA12e8367d123aea07c5eb075b62579707c87b8042f
SHA25655486202dc2808c182022a275560bbe36bc058e2337ad08937566fcd7695d038
SHA512eb547482d0454b6938087cc4d228c129a55db5bd71b2f0e3bfe3c18168715c05d665e10fe6c94655f7f83c0080952b079869fd47120e295d359d972bf926f10b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD578c2e789f469c9730d80769dfd5b6d11
SHA1cac246ba25863ca8c85a87cc0720aff554b13e7c
SHA2565eebda6e6b2c2877f5d214b7e91c426afbc54f3a695e2561924502e6115871af
SHA512f90f56df413bd98e0989901c1f95787ed456fd3e38301a1b89ffed74cefcc71cb570d6254b44cc31892e9b5a80e89f1a6c7d7a7a5e1c7109b821e2da4fc7bf52