Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
3eb5a069b77f057b9a4fd87ebe0508d5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3eb5a069b77f057b9a4fd87ebe0508d5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3eb5a069b77f057b9a4fd87ebe0508d5_JaffaCakes118.html
-
Size
21KB
-
MD5
3eb5a069b77f057b9a4fd87ebe0508d5
-
SHA1
2d205e0544228478816409744f4a0bf5afd67fcc
-
SHA256
f82ad661379fcddfcec1fdff960f894abda89d43bea76f784bf37282e388633d
-
SHA512
e999be6aaca372aa5c2963c9dcaebc41490312efe7a43cf4666b56e6964ec7149960234a0b2d4c7336a137d318c56cd05f1c3f06a63a51733d293b5d54e0c641
-
SSDEEP
384:oWddzyXIbvI/e1e89oOc+x+n+uGjFkx7waw30f:oCbMe1eyoOc+x+n+uGjFkxX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4340 msedge.exe 4340 msedge.exe 408 identity_helper.exe 408 identity_helper.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4340 wrote to memory of 4732 4340 msedge.exe 83 PID 4340 wrote to memory of 4732 4340 msedge.exe 83 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 964 4340 msedge.exe 85 PID 4340 wrote to memory of 4740 4340 msedge.exe 86 PID 4340 wrote to memory of 4740 4340 msedge.exe 86 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87 PID 4340 wrote to memory of 1604 4340 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3eb5a069b77f057b9a4fd87ebe0508d5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffa148046f8,0x7ffa14804708,0x7ffa148047182⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1773316391939349487,12997266984411837391,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD54747ac6069cf850a592aa8c1df243729
SHA1abd676a289919baef9641098f6a1213e6db8ded9
SHA256dee43a75630c630dab62c99fb02195b7105d9bd21a8c8ff3a2d5fd8690d4493d
SHA512acabe4b117426fa4d379fa6e0bf01ed880c13af752ef4bb5cf83955c2e7dd2a390b4a102e5074420c7aa647bf9ea7dc2f9dfb8a99934c609081697bcc4e4fe76
-
Filesize
815B
MD59a12a7b3bb1a28db1fc93b2922677342
SHA1d5229b9b75e9ec2a8b384c10850c371639508cf6
SHA2563095069e363b6fab47ea1054398ecd4d5565def019a2ef15e6d003c63938d021
SHA5124fb44a23cf9b1d2760f9a35fe9b29e62322e39a352e59bdd8caa3605e7663fd998878e287ed2787ebbe119f9a3f94918832bf14a0ba5a28fa61edc87e07d1f05
-
Filesize
6KB
MD5918fc203bea4794cabf879a146ee9110
SHA14bd9b39dab394b647f568b50230a4e428e1e89e4
SHA2560687deec45dce00be72665c4910714210a0ab362907904c902c00817243f8841
SHA512f7937c0c41e7b32a79bca92e6a328d87ff989178f21aff3debf65284798a2108c3ededeb2012e941a415c6786dbe917fdd61d1783a2197c8444654dd30c7166d
-
Filesize
6KB
MD58780b28d0a9e7e3dc8c8693b42e1f5f8
SHA1eda6f1753a42f87df1e14e334882876ce6af44f4
SHA256b5795aceadb211cef4405844427957a54b6a621b489739bf3e81184f7942662a
SHA51273d1c09e1908f4af7b4ef7466e6ec2d7b93cc52334d305b432102c5779627b8024dbd0fd4b0bfbef9e26e0e7d874a01ca991366109ba499da7f72f1139509afe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD595c920ac6ab4fc59aad2baec0c225108
SHA1728bcf966f0978e39f077b5ed52a9194c51f8a99
SHA256e78f379c3b5968c4f2f610bf0c5863ca775a9c1b453089ce25ba194929ca4a90
SHA51283aaba03ae939121b3f5d1772a62befcfbab55873c788d08627314048090edc7010ebcd79f404e821a487e046ec145e3c8dff81554bf05644d5134076881d115