Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
29d40ad7b58b4791b00e06295416cc99_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
29d40ad7b58b4791b00e06295416cc99_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
29d40ad7b58b4791b00e06295416cc99_JaffaCakes118.html
-
Size
139KB
-
MD5
29d40ad7b58b4791b00e06295416cc99
-
SHA1
d1fd26c9ca7d86850e2e13adb8e6a7565e6d194a
-
SHA256
922cb8b3e61b74ebe9336e7497edb329b6de4dbfb425637259dedd1b2b812128
-
SHA512
c7ecf5b7910333ba5e11cd91187483250e92b77b1f3cec7c1f0a73f507749e9d12b4e3314e58bc3e405323324bdd9d302e2d94c99b74b0a7b3b7c5b128c59e2d
-
SSDEEP
1536:SQvxgaXfZqlZNyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SQjXfZeyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 2992 msedge.exe 2992 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 920 2992 msedge.exe 84 PID 2992 wrote to memory of 920 2992 msedge.exe 84 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 4536 2992 msedge.exe 85 PID 2992 wrote to memory of 1728 2992 msedge.exe 86 PID 2992 wrote to memory of 1728 2992 msedge.exe 86 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87 PID 2992 wrote to memory of 2984 2992 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29d40ad7b58b4791b00e06295416cc99_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1e7f46f8,0x7ffa1e7f4708,0x7ffa1e7f47182⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2739959888104887239,3335045486012719770,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2739959888104887239,3335045486012719770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2739959888104887239,3335045486012719770,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2739959888104887239,3335045486012719770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2739959888104887239,3335045486012719770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2739959888104887239,3335045486012719770,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD52b3b9f38ae74ea99de51e5a907cbb0ce
SHA17a93dc2331b3da480f261b32cd7193a454b6fc7f
SHA25606bbc5730a8d05582acb23ff3a926625a6c12a3d7f493bc7490b2ea9aa3260ee
SHA5124e026dfe736c7ee226e358a818e8b6b7325dee41802aca7efae346566bf85e79e205aab79b5d6460ce07f816e02185d7d30c11a78401560bdb08537c24900216
-
Filesize
6KB
MD53d5dcb4b53998c028236c97e8fcb32f3
SHA15dd8d70fb55daee97f543b37d1356781efdefab5
SHA2563c3e78b7c67863bd341e3170aec8b773d43d0ba4e72b4aa765f2b29c889a2202
SHA512848cf16d07ddd38a54eedfe17bc5ec0813372aa30eb0c3f6211034c84aa314f9b3c546fe527af8b232b66e347564e9c14a59bd0e56d43f3ea0b6517665c031bd
-
Filesize
11KB
MD5b959af5b399e61ed5a325d691fe5c5bb
SHA1e87921ae9b60909c1613812db9bb078ed84fec85
SHA2561d84e9ba0fb5867f5a90cd1895b63976322fc3ef8ef8ad699196a71db3513217
SHA512c1d1b34ea74f677e8d1bdd66656bde0b35d5335775450ee4fa1092ace3051495496beb8f464fa644323a3757c0adcebba46418a059f3b02bb3bd145ba8dbccb1