Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
2729fc35d01fb70994780077990e3003_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2729fc35d01fb70994780077990e3003_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2729fc35d01fb70994780077990e3003_JaffaCakes118.html
-
Size
18KB
-
MD5
2729fc35d01fb70994780077990e3003
-
SHA1
d07aa195723b633c34b36fbc1bc476c5a0361f2a
-
SHA256
d6b211bc002b967b92cae2d0b6847bc64d903efe992fbbc56e991949aeb1c71b
-
SHA512
6279e5c743b4dec0acd95bea29779e700da7731a492f475fe04d5b9e8f81154c5659de9a3b4dd571c8d0a0bfa58e2f26d586781542f353a9682ca30229ee00db
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIN41zUnjBhvB82qDB8:SIMd0I5nO9HNsvvKxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3740 msedge.exe 3740 msedge.exe 4456 msedge.exe 4456 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4456 wrote to memory of 1100 4456 msedge.exe 80 PID 4456 wrote to memory of 1100 4456 msedge.exe 80 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 4224 4456 msedge.exe 82 PID 4456 wrote to memory of 3740 4456 msedge.exe 83 PID 4456 wrote to memory of 3740 4456 msedge.exe 83 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84 PID 4456 wrote to memory of 2728 4456 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2729fc35d01fb70994780077990e3003_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd625346f8,0x7ffd62534708,0x7ffd625347182⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10416284389768966681,12732640768857882122,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,10416284389768966681,12732640768857882122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,10416284389768966681,12732640768857882122,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10416284389768966681,12732640768857882122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10416284389768966681,12732640768857882122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10416284389768966681,12732640768857882122,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD57572b21cf9e95ab1d6188a2152696e2e
SHA160d0b71f2b75b28aed588df3b2ba6d53735c0746
SHA256633415b409bf02a52a77d66f75439a9eb39c3a344c6b37b9db4ff85bb661d079
SHA512d7c751f046c43287b2364b8da2038067eed7b83ef8ec47de570a4fff12351b2f1fb90e70944c2fa848e9ca1d60b20c967a7d27d9155596c2b8fcf513986641c3
-
Filesize
6KB
MD5fc614744f5a116a370780f1961b199d3
SHA171383207fe001366efcd1fe50c1916abe2106616
SHA2563ca35b1266d61456aca16b064a825d03e69f5d743a416d01edac5dd226e4e9f7
SHA512e55273622481c64babaa7751317d623a223ea64f1f0687f645ebb96fb84e1916cbd2ca837d0ded0eb97df6ada0b95a4e8c5abb8819a29e60a6ce86f4895e87e1
-
Filesize
6KB
MD57cfe64e0417f071852f9558a9c756c9a
SHA13fcf9bae03d673efd598bf2115e642a23a283be0
SHA25675e661e8f0263f4d99e9d8df5be8d8d465eddc6840a7c899eaa3e29054fca5f9
SHA5120d48f259d54bbe793ee824158b01fe326bc30bf1374275f26b552fad3798634cc4115c88a2dcd4cf6d4b95cbaab2bfc34297f342ea7171686f028d76cd0341eb
-
Filesize
11KB
MD553f207521645f40a7b7b5a47009a6844
SHA1bea7c082c18f17507376995e35fc304bf06ea19a
SHA2562d81a3b99f47b134ae03d8be3f860c7adc7b8f305f78677fd668febe02e08e7f
SHA512b042993f2591c6f2e8a88a077dd020144d9682d2efa7f0734ce27260684dfa4eea15e5ad636b2b719049c13bc1a6e8766adcf8a358d17f20461a10e9221a0119