Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
20a65b9a695cf3ec1322d1f8bcfe80d8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20a65b9a695cf3ec1322d1f8bcfe80d8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
20a65b9a695cf3ec1322d1f8bcfe80d8_JaffaCakes118.html
-
Size
18KB
-
MD5
20a65b9a695cf3ec1322d1f8bcfe80d8
-
SHA1
4a8527f80f81bbf52c0b8ca43079f55c1591425a
-
SHA256
3d81eb06fde671da002a3a8016d0b27fa72f862b986f33cc8eb519a21a8f4f45
-
SHA512
1b67b0185a9bd456b20bf41aae1b273c4df9203759c1b74e610e0f3e8880e78f3583945bca074e08a5d4503ca22736ad7bb214713feca1bc490fd0c74a3b4203
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIj4nzUnjBhF/82qDB8:SIMd0I5nvHxsvFExDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 2312 msedge.exe 2312 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1440 wrote to memory of 4204 1440 msedge.exe 83 PID 1440 wrote to memory of 4204 1440 msedge.exe 83 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 3172 1440 msedge.exe 84 PID 1440 wrote to memory of 2312 1440 msedge.exe 85 PID 1440 wrote to memory of 2312 1440 msedge.exe 85 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86 PID 1440 wrote to memory of 680 1440 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\20a65b9a695cf3ec1322d1f8bcfe80d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeedcf46f8,0x7ffeedcf4708,0x7ffeedcf47182⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13863578380859414815,16533953146529429363,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,13863578380859414815,16533953146529429363,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13863578380859414815,16533953146529429363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13863578380859414815,16533953146529429363,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3068 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,13863578380859414815,16533953146529429363,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3220 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13863578380859414815,16533953146529429363,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD56d212dc9ac332111615a9bc23312124a
SHA1db14353b27c905c511179371d7fcbf4a4e6a6967
SHA256d5b8b6e4f77614cff1d5487ff2343df92ab07f681116008bd5b5eefd66eb7382
SHA5127d232c79c6584a7daf4239f88a9bbb0f67a4b6bccacd4b47f309df4050c5098c024342dae3759e80b7b46ca8d3d533e94bb5608f39c7a462aef51a4097aad2dc
-
Filesize
6KB
MD54c0356a6863f10256fe2ff337d1b8224
SHA1f0512eee0f2f639ca692fab45830fa3011b2d279
SHA256d8f9b3a42c8afd84f347e62570dbce8a11f0f368bbcaa24f950a327243ed7852
SHA512c8e77da928494e780e810c63011ad3efdc692168420c2984d00fa3eb7c3b82802e509a437d755e568173b2db132466848f2a73df6df9739c073d9606f06fc701
-
Filesize
6KB
MD52a5f447758ae63eda853bbd313776b4b
SHA14858e19b0267ceaf93dc3531c89048c76a2012a0
SHA25600aaa7aa0aadbbda70824ec53e643bac4e00364c2b0fc9c2cccddc139a3af4c3
SHA512397bdbac957a63f553c66ca2e4463b6ed931464fa3ce246bb54a7c7af4c5291455f4cbee932c74a02d88a24bcd53d5a98ec81935b9fde9518bc5ff77cc601eab
-
Filesize
11KB
MD53d9754b3bbc63a8c7c726f509c4c116d
SHA10c1c9fed55b4f5277ecc8ade36addedcf7e38c2c
SHA25618b7bb650fcba1657c3bd89474b1be53c00cfcc2ee6be0df1a9e941d21cde7cc
SHA5127c1f8f31622ed7e32a1b367fd5aabd996c5eef812c1bbea668e382e746a1f6ca8c19447d2008b472b44ec98f18553936269ee5dde8fa594c516b1647cf83c98b