Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
3fe9a4c7e42abcd4d0dbad0c81378460_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3fe9a4c7e42abcd4d0dbad0c81378460_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fe9a4c7e42abcd4d0dbad0c81378460_JaffaCakes118.html
-
Size
19KB
-
MD5
3fe9a4c7e42abcd4d0dbad0c81378460
-
SHA1
3ac74852ff0f3013b10eaaf01549f2c21854dde0
-
SHA256
9ee8281d57734bc490407e38a73b6392e0e42b8fddd0561a2399811a41a3c526
-
SHA512
68ad2c5f1b12336c1b8bd4e1859d3ebb17842038283eebfa5d2ef596d8f652e6a413a636a88a6c3333928afaf5e1e59377e4a1b6425a0691a9a6d5e155d13154
-
SSDEEP
192:E0LrHcw2+++HjBJxJgNkO8OoXKkKBCRxJLxOBPweWuQHoJlzl0w2TR7Dv/s7+c1Y:E0Ljw+cn8XKF1r7H8++KgEanvaDg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 4172 msedge.exe 4172 msedge.exe 2952 identity_helper.exe 2952 identity_helper.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe 3960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4752 4172 msedge.exe 85 PID 4172 wrote to memory of 4752 4172 msedge.exe 85 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 3100 4172 msedge.exe 86 PID 4172 wrote to memory of 1512 4172 msedge.exe 87 PID 4172 wrote to memory of 1512 4172 msedge.exe 87 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88 PID 4172 wrote to memory of 2276 4172 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3fe9a4c7e42abcd4d0dbad0c81378460_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa98a646f8,0x7ffa98a64708,0x7ffa98a647182⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4023358980690231727,5650698512649933457,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
1KB
MD5c6150925cfea5941ddc7ff2a0a506692
SHA19e99a48a9960b14926bb7f3b02e22da2b0ab7280
SHA25628689b30e4c306aab53b027b29e36ad6dd1dcf4b953994482ca84bdc1ecac996
SHA512b3bd41385d72148e03f453e76a45fcd2111a22eff3c7f1e78e41f6744735444e058144ed68af88654ee62b0f117949f35739daad6ad765b8cde1cff92ed2d00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DABA17F5E36CBE65640DD2FE24F104E7
Filesize276B
MD517fa915ede1932cb7fb4bfb277a2af9b
SHA180118556b22a085d07763f2fd91ffdd6a5a89678
SHA256d3214dc3c7d4619aeaffe8cfb47195836d6fb1493b02d9acbb6d32f5037d2d0f
SHA5129c2687d64fc65b2d31f44d95497943b29c4e7428cccd8a02738e511972c155b20bd5cf5d073590c56c02b2ffa4681c6e60152cc15d7530875312b54f04f513fa
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
554B
MD539e1ae9e368a45fda87bd5a265dc9b3c
SHA1b4149fe64822900d289b775e92513ea10863b4e9
SHA256f64536699ea2905c2e2c6a7435f7c82edb4e364d8c5cb131ca59881b3910cf9c
SHA51261cbac040def6d14326fc729eb95a7fd8e3c376e7071ab5b868de3f31a0ee64a080b31c65432591947de4bcb5240328df9af3c4b34d4f94b553b4db9fca09448
-
Filesize
6KB
MD540415d3f8c9d4e53643a16708f01d0a9
SHA10177f04e5f43fe16388cb50d7af0f414f27961ca
SHA2566247e0683c805d9b596463046ac756119157a55ea8a4204ea22f991ca776f759
SHA512a0ae7b718fdbbcb1164aac05ad08a4f8982c0469666b451af93f7f14aee52534a2a0a7a9f116351bb1f6e3ad4782e0f983e00b7ae9b48e1834a1ecb2d47e63c3
-
Filesize
7KB
MD5819b50e8c1d3acc40d7a8649c06b0677
SHA1a2011f3b0fa9b664dea2f7882bf716d7f40c2656
SHA256723a878c13b2b0cb533bdbac67d07970638d8fc10f0ddcf57a18753154df75d7
SHA51212e533fece7ef0d248ad7043e21e3bc5ccc772a8f3839bd8ec27844e85f314458d293fbc711fb3dd4529446a4339cc0655740cf4840ff6efa680d289666e0f36
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5072cf38bd5d1b9a146f43f5fb75dce48
SHA166f74b5695b7d64449654afb966b07a6a403ce21
SHA256e089e14d250a1afef5ebc61a81c105daf117bb31c5a8b1ce9a2f928f44755abf
SHA51241e8bbc80caa595a9a790d55ed9375c02d2659a4bd2068a5de4b0bb9a8af17b9c3de19b5568193e1e8640ba2fde0d06d21e03579d20efbea1c6b6b7141d76db8