Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
4347cbe878b773e945258ddc793369f4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4347cbe878b773e945258ddc793369f4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4347cbe878b773e945258ddc793369f4_JaffaCakes118.html
-
Size
38KB
-
MD5
4347cbe878b773e945258ddc793369f4
-
SHA1
738e159ee26eb5aad861925b7e1a255c3b204256
-
SHA256
7d08a7eed0d82aeb201fa11579fb232c823f36f17d4ace9fdaa0f3358cc5fcc6
-
SHA512
b08ca1ee9082c95da86777de8e97f665b06c0f89613d7c452c196f86c6dfc87278c7ac7c0c6245c51ae4f290e6a2e4e0dfee18cba4d2e0feaac478c123fc9beb
-
SSDEEP
384:sYlIcUtR4jVGTHZrHIyhtl/9MQTGRMtktYgktbu3RkxGRG3wEtARr3+xkfPHC6O5:9/BTDZZtgGsgExLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1580 msedge.exe 1580 msedge.exe 4804 msedge.exe 4804 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4456 4804 msedge.exe 84 PID 4804 wrote to memory of 4456 4804 msedge.exe 84 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 3388 4804 msedge.exe 85 PID 4804 wrote to memory of 1580 4804 msedge.exe 86 PID 4804 wrote to memory of 1580 4804 msedge.exe 86 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87 PID 4804 wrote to memory of 2868 4804 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4347cbe878b773e945258ddc793369f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x80,0x108,0x7ffb993b46f8,0x7ffb993b4708,0x7ffb993b47182⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5138138376378678510,17572962158234154069,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5138138376378678510,17572962158234154069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5138138376378678510,17572962158234154069,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5138138376378678510,17572962158234154069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5138138376378678510,17572962158234154069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5138138376378678510,17572962158234154069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5138138376378678510,17572962158234154069,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD559f8ff280580ff2654a914b0d0b8c423
SHA1e2a83ee502580e04fe994ff787a9c293d4468e46
SHA2567456d482fc33a504076a3ad49bc8b65ffe7fd3d0ddefb564a25cfe697dd6e84e
SHA512b3ac1a3c195246ec8daa5f5e8eac78ff1f7c16d2fbb3f13035ca099b193b1ea91996ae2e040e7cf410f43a5a00e3da651fdfcae4dfe0f46b59365ee166434c1d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD589878001dfa41dc2297e124073d345f5
SHA126bc3647344997ef88266a504131c8bb78ae44cb
SHA2563fd964119d86bc5a7ae66e9a675c7fdd120a723868a1a3f23be2ed5ff4a342bb
SHA5125aae24d8dd7995bdd2a551ccd26460cd40ad70ea77ac5fe7474d958d21b7f66c1804f9c45238c9eab5c32a8c5363a4641fbd6eadddf8cb934d40e5055f52a42c
-
Filesize
6KB
MD53401a6ff93433df308489e5eb7f1a1ca
SHA1c52edbe881d00225810e70449cfe6e37d53df207
SHA2569713008021ecee7d79ca4df7ffa706885be85ab2f04860be93cdfd2f8b02de8b
SHA512931886b00015bf5539ecb46fd3a4f9377d8b273cee67d0683e4a0a079aec569e3aade76993e3fb6a12a5be248c71efaa848b42653b2ae65842fda45fcc449209
-
Filesize
10KB
MD5326ee683c93e83190b57355c07c3db1e
SHA14f029a4bcf247038fefb5afcda412bbf234477d1
SHA2561758fcf7af4ee31dff54d3deca57015141d9ec090ea9e880324ff6265a6ad719
SHA51299f3160fc29e3b7fa7b6209da2489dfb689837ccc7b2b81fe74d338592aa3577a32b6222e1b434a3768f425236a3f74daa124677e2960c1d5a65d7a99e60ba48