Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
02705210045a4c895f5f2d558da892be_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
02705210045a4c895f5f2d558da892be_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
02705210045a4c895f5f2d558da892be_JaffaCakes118.html
-
Size
171KB
-
MD5
02705210045a4c895f5f2d558da892be
-
SHA1
40d9b405c1b4719b65493a2f2d1732f57db88031
-
SHA256
6dc870adb5ea161ce2322721233a2d433946fa4ea76cfa2ed7ca2fde31ed4554
-
SHA512
7d97c9c1475c8553207b55cfe46dad28172173768a246bbfc13ad7b0c5932dc747775258363b3ae895ad92ab647c63f9c558bdd44a992581570bc5e7a40b86d2
-
SSDEEP
3072:y4u0ibI/78C30k2QF0QuGwAosUumR3P6YTfD8C4:XibIT8CEk2QW8wN28T7c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 748 msedge.exe 748 msedge.exe 984 msedge.exe 984 msedge.exe 984 msedge.exe 984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 748 msedge.exe 748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 748 wrote to memory of 4232 748 msedge.exe 81 PID 748 wrote to memory of 4232 748 msedge.exe 81 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 3528 748 msedge.exe 83 PID 748 wrote to memory of 1840 748 msedge.exe 84 PID 748 wrote to memory of 1840 748 msedge.exe 84 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85 PID 748 wrote to memory of 2844 748 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\02705210045a4c895f5f2d558da892be_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe4,0x100,0x104,0x40,0x108,0x7ffa002846f8,0x7ffa00284708,0x7ffa002847182⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13133544574415301952,2557595405172153934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13133544574415301952,2557595405172153934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13133544574415301952,2557595405172153934,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13133544574415301952,2557595405172153934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13133544574415301952,2557595405172153934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13133544574415301952,2557595405172153934,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
6KB
MD5c97a713da0c8464ed7402a92514afeec
SHA15d7f12868c1b1b4cf6471c3923906292bc4aafc9
SHA256e6894ea8fe6a8b47a455759e97f1858a7a1e5ffd5e66d5bc35b35e9ab7aeadcf
SHA5126f4e330ed6887df088cf3fabd885feb6a5b65f83b40ce1c197de807a269beb0824bd67e2294df735d7c2326e80627ed443644166325ed7542cbb2e6a79ab5b3e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f6a65919-f012-429d-b2ab-9fc185838ebc.tmp
Filesize6KB
MD5cee811d3dc34b0f61fdbc450a2edc0fb
SHA19fa14e6b02bf97d6d560a232f37f549fa561e521
SHA256edfb3133bd78b3aff9e81fd6039bcfbca7335bab7ed2c34ad5fd0dd7f3f68509
SHA51249a06479560c17a78158d6288eaf8f5cd637ca9c6da13334327458851f54d6811d4d794fe12fe3c45c93921a65be52e0065a17ea01222345357e8c330dd669ac
-
Filesize
11KB
MD54132ac6f1a6da3106af12a2c9343318a
SHA1f52218881add6d8880334a890ff9f755dd78cf37
SHA256098d1cceef8e8a9077da42e7a469dbeae580415f3b9ae310b93e3b2103a4341e
SHA512dd1cab2711b0c2a468e11345c002af156b265505487d63b32d9bb7d0c3bdbe297d09c2ad1101221032d6d4304d88d909f22845c88d7b4d954bd4d95989c5f00c