Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
3e65ba77a837dd5478a20cf1b9f5e80e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e65ba77a837dd5478a20cf1b9f5e80e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e65ba77a837dd5478a20cf1b9f5e80e_JaffaCakes118.html
-
Size
26KB
-
MD5
3e65ba77a837dd5478a20cf1b9f5e80e
-
SHA1
c76d305cbada0974919628db3cb0cc8988bf30f6
-
SHA256
6c66edabe1a582565c8765f6a41b3eab4e1b3785a6ac147528488d4e86e7c7b7
-
SHA512
eb1588c186c43b370f2341542f6f03704487820469cb715848b4d167207ba10bb0aff949d388b6778fe4091c174c03f07ea35501a0621b27853dc8789c872299
-
SSDEEP
384:4+QfPFd9QZBC7mOdM8YBKfpC5IgSnbmFe7AcvG6SokJvAgo0i8AvPd:Zcd9QZBC7mOdM89pC5I9nC4EIP0i8oPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 1472 msedge.exe 1472 msedge.exe 1824 identity_helper.exe 1824 identity_helper.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 4476 1472 msedge.exe 83 PID 1472 wrote to memory of 4476 1472 msedge.exe 83 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 316 1472 msedge.exe 84 PID 1472 wrote to memory of 4872 1472 msedge.exe 85 PID 1472 wrote to memory of 4872 1472 msedge.exe 85 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86 PID 1472 wrote to memory of 4032 1472 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e65ba77a837dd5478a20cf1b9f5e80e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83b1346f8,0x7ff83b134708,0x7ff83b1347182⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,18378305244758805990,8454749226927565721,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD568f566dbfd709fe8e8aa44a843871c8d
SHA1c19aaed2ac3be07e9774df3ed130c02a4a1c709d
SHA256ae9552ddb934f6dfaeb3a0d31afa7b446af6eafb7d0fac5f969481bc7e0ad34d
SHA512f32d870a0f6ccf9eeaa22a2603df7ee16cd3cd6cde45eb6ec20df371afe9f34b3dc8f9d02af3bb38dce406f6d1a3122edb253a22f9ec9894ae3b54bb2ce0ecde
-
Filesize
1KB
MD597e0a576a9362d7662d24ac340a51db8
SHA16d6f8bda9e053c74f68ef99ff3f3db1dfa412390
SHA2563a3e487fe49c2cfa340e576cb4c2c54413455a153ab23d78ee52ea9538a5a3e6
SHA5121c73e3ee77a588517499f9029aab6822d0ae0bf3179ec70126d61350db8873964c99ce339152393459b1908ba6c62795b2309c6d84d69a77003d3f685b74ea2a
-
Filesize
6KB
MD5d23fc78b0b476bf1f15cd5d750198685
SHA10b9eafbc38e46de7aa11e120db1065a0a0b66e06
SHA2566804eb4ccdbfe7e74af0691cbba1c315cb9ee83e40b8ee9859f334030dd54989
SHA512d8930098ee4cb7e95e0a91d8db8a4930556faa2a587e5d513e8ad5f8ee9afd5cc2db87cf240eb5b68923af5e0b61492fd626c030f4b6d48b8affed0d34770a08
-
Filesize
6KB
MD5fabd0ff1c5792f94ce7b8b2cafa7339f
SHA13cc88cfb1fad123b9b89c830396c605c1501b837
SHA256ad3e7aa7093ffe5c494b8a9201ce0832ed5b75b1e7c44f34654a4d58d06626b0
SHA512d68669bdfb18721b6382e1d45109fad054668f08a2b1591bdbcc083a7d0a63a87028e99636a8436420467ccd732297037edbd93ae3968bc764527041c1fffbfd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5211a50ead3cb75fffb70108b30dd55b0
SHA186b292e3c8bab5b943220f59297ef20d662faaf5
SHA256c86c63c2163069572c2275cdbb79d27f017398d72c4d26524d30f639628fbad9
SHA5128e75d0ee387729fc7b01dfe70cdc8203441936e934218d8016789c98ad4058274b48e8f6aad1c028e57ef12b10f627939dc200247a1d2313abfd4cb080445efc