Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
108b5f815b6d7584b4d00585ee4a2f96_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
108b5f815b6d7584b4d00585ee4a2f96_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
108b5f815b6d7584b4d00585ee4a2f96_JaffaCakes118.html
-
Size
213KB
-
MD5
108b5f815b6d7584b4d00585ee4a2f96
-
SHA1
3ac839fbe5bf897e0c19419642a4466bdb1a2a1c
-
SHA256
41a95e78b47e6f0fe65513e09a19fbd0ec9cb25dd2ab05e0ca16e2be157708db
-
SHA512
2af160f11b92e9a09dbecc36079dbee5771e24be39a60d6ca64a15ed0db2d00064b5f44c2b827b250bd6b85f95f6308b9ec35b2de646da50a84423bb105286ba
-
SSDEEP
3072:Sr0qLrIA5dTcyfkMY+BES09JXAnyrZalI+YQ:SrzFTBsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1628 msedge.exe 1628 msedge.exe 1092 msedge.exe 1092 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 3904 1092 msedge.exe 83 PID 1092 wrote to memory of 3904 1092 msedge.exe 83 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 3616 1092 msedge.exe 84 PID 1092 wrote to memory of 1628 1092 msedge.exe 85 PID 1092 wrote to memory of 1628 1092 msedge.exe 85 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86 PID 1092 wrote to memory of 908 1092 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\108b5f815b6d7584b4d00585ee4a2f96_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff957be46f8,0x7ff957be4708,0x7ff957be47182⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,830382870646048858,16144007291330881691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,830382870646048858,16144007291330881691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,830382870646048858,16144007291330881691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,830382870646048858,16144007291330881691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,830382870646048858,16144007291330881691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,830382870646048858,16144007291330881691,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
6KB
MD558a27ba39b7b9fb89e3d11d12efcf6e8
SHA197debfb577c9e2b78110c744b16fb960beee656e
SHA256314d6a2dcae69c4cb29131313896138d2d5837c456e4ca6de49ec5ba628a8b30
SHA512ed1bc3ed81421a204848cbe88950a13a107c318a97e784b5753e045ec0b3797130b6fcd9f241108b4eab1754bc23a18d74d0080a16865668a4f3abb88c63a6a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\adab9980-9820-4e04-b1e1-1ecb7f2bfb21.tmp
Filesize5KB
MD50311b7b356f4b5dce5ba4fcd0dafd1a2
SHA1b06afca06703836b26daa665070dd8b65f410293
SHA256156c62c00c16d47e9445881e32582834231a110d30beb4895688699fe1b82dad
SHA512e4c2556ba0b75acf27c98ff2d2ea051d0fda967751cfba0f0ebc9ba002138175028b7a105be7f0983375d2d5cd287ac01d3fdefdade01e08ddaa2f9ca338f985
-
Filesize
11KB
MD5174d7d49052db4b8a8c5b250c22142b5
SHA127711def2b5d367fc66993ef3205efa88fecead6
SHA256ea2ce720e9297e81c5fa7daee98d410a8a82fd3551f9d82034a9c73768d16e47
SHA512b56374caf580bd97ff3b9fa7b193d107f2234e8d10ab46eae2a9000e6daf440f9073c9c6a8bb783259c90e187e2a3259dfeddcd7428a9a9431fce6bb29fe8439