Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
12752110cbaef90110040c742f9e67ec_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
12752110cbaef90110040c742f9e67ec_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
12752110cbaef90110040c742f9e67ec_JaffaCakes118.html
-
Size
214KB
-
MD5
12752110cbaef90110040c742f9e67ec
-
SHA1
c6f0edd58a257949da618e646e2849e811b5997a
-
SHA256
5dac62a9985bbe1e4028cddd932b2154c497d9be2b6be5502b785302bda1d1b2
-
SHA512
ffe9e9812e44de47d647afdacd54b4e7b53d6dafa376cdbc4a831ad1ca703f81adffd697574a00300cb76e080962f4da8458200f0fc358576682cde0c1b826e5
-
SSDEEP
3072:qrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJA:iz9VxLY7iAVLTBQJlA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2480 msedge.exe 2480 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 3716 2480 msedge.exe 83 PID 2480 wrote to memory of 3716 2480 msedge.exe 83 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 1348 2480 msedge.exe 84 PID 2480 wrote to memory of 2800 2480 msedge.exe 85 PID 2480 wrote to memory of 2800 2480 msedge.exe 85 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86 PID 2480 wrote to memory of 4500 2480 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\12752110cbaef90110040c742f9e67ec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe39fc46f8,0x7ffe39fc4708,0x7ffe39fc47182⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,11270042046306755543,5296385300492353565,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,11270042046306755543,5296385300492353565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,11270042046306755543,5296385300492353565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11270042046306755543,5296385300492353565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,11270042046306755543,5296385300492353565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,11270042046306755543,5296385300492353565,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
5KB
MD54942481b6eb78d6fc492e4984d5678af
SHA18a29bccc8ecaaf5049dc9fde56b4c220bf29e612
SHA2569e201ab922e563ebbde9be1b0871e82b374cc9da05cdd64936298e5228b1b41e
SHA51228401dc10622e2348771e32f7fb4ceb4cf66debea2d004c84e75011cb2449069aff9c351289801c4a93035f663081249889cae3b755f84dd9b6794c535e774aa
-
Filesize
6KB
MD5bb1327b1003d607aa5830978ae344b36
SHA1a9aa21e6429fadb018d5ff65b1458dc9826b9d8a
SHA25645983254c310edfe1fc304db74a078d55227575ced8672407df0f86d8cb6397b
SHA51290deddd8f92e4aec967ae8caef501af4f9c3dd48f73c9cde82c35ba74d3258c329860e28b98070a1d4d4590d7ef6711a9e2facaf066bd75fd43163a79a01f412
-
Filesize
6KB
MD59b2193399b9dd60cbce936ec004e9dbd
SHA15898e36406c9514fa2630093a4b5b22103334a90
SHA256a0cd9776b5bab6987e1ee8eb88381f74a43e7e114665617c0384f9bef8ec3047
SHA51201cdbce6bfdba97544f5d4121ff91c81c98d287993c0bf21a789a3be0b143adc844fa30f914510db4673860983e0b8aa911a731ac74b1d557ea70fb09ec965b2
-
Filesize
11KB
MD55e8b589b55bbdb4ccec21eebf0842187
SHA1d4a7cc4ea8a47b3de3232fbf9e9385b871dbbb07
SHA2568084f08341b24090c422c598e018f9edb4d023fb921cbaf6eb49bc2423dc373c
SHA5128a9284bc626362fac3cffa65cd88360d661cab7cce5b757265d31e4c8c73df074e2eda0d73b7e1c5d03905be14d96fb0607cf4896c46fd930e3de25ce6699518