Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
2c609c0accf5e7490ee9187d60669155_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c609c0accf5e7490ee9187d60669155_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2c609c0accf5e7490ee9187d60669155_JaffaCakes118.html
-
Size
213KB
-
MD5
2c609c0accf5e7490ee9187d60669155
-
SHA1
a59c201fa8d29e2bdb6183764f554bbd88476e81
-
SHA256
f13700f1a68980cbea96499aadd1f14e66d15abb766ffc533ef09b2836342ba5
-
SHA512
6cebe526577ce9eef495bc634f000e5c4dca04264d044b063f0ae1bf0bc1cae688fcc2b18203373ba6895ac596e1c209894ec65a680a616312744c84e3ed6dfe
-
SSDEEP
3072:SUjknYsFCaHyfkMY+BES09JXAnyrZalI+YQ:SU76SsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 384 msedge.exe 384 msedge.exe 4400 msedge.exe 4400 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe 2436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3000 4400 msedge.exe 82 PID 4400 wrote to memory of 3000 4400 msedge.exe 82 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 408 4400 msedge.exe 83 PID 4400 wrote to memory of 384 4400 msedge.exe 84 PID 4400 wrote to memory of 384 4400 msedge.exe 84 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85 PID 4400 wrote to memory of 4796 4400 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2c609c0accf5e7490ee9187d60669155_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa270646f8,0x7ffa27064708,0x7ffa270647182⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15593770144953996918,11700259568732467382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15593770144953996918,11700259568732467382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15593770144953996918,11700259568732467382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15593770144953996918,11700259568732467382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15593770144953996918,11700259568732467382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15593770144953996918,11700259568732467382,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5654fa7c8add4e5124d44f0b24b1ffc17
SHA16073c386426ed8c2d8d8e2cf8c93b4d92675f9ee
SHA25688f1e1c184d49c22ca26dc1fdf92b316e4efa99eb989ac4c416fb7b98db6edd8
SHA512c5b6daf967e327a6d892eef1ef8061443a8b70622b01987a5f551927a82423572baecaa9bdd44f817ae0df814c3c1889324358c850c21e79fea5ff44c2c16848
-
Filesize
6KB
MD59efe85c8c2fe9db77553e4114e7e1028
SHA1c5e7f985f7ff71dc4e86da6d8182640a4a2a6426
SHA256955749a1bdb76d650c2f78d6ad8fb4b54aeeb2e950d7fdab5d4796a1dcfc3679
SHA512d5dce70499c4bdefbfa9e26672041ddc91e6dee0531147b9ee448a84868a619e6fee294bdbc84914b2cf23505330e649047c6f41319f17a58fb423af94d184f2
-
Filesize
11KB
MD51877f1f5a2d7cd3e92e36ba84b13d8e8
SHA14030063fdb81cb917ca914ba38ddc7d24dcd5978
SHA256c4bae98d6b684085af6c091aa35f97b8d8eacab076659080b5c7f77e461b9be8
SHA512d4dc883c0f3b0dae9aeb0be4ed38d237d09bde2bbcbefe65dfe48bc0aac579d416ae79f1ec579069ab560df0d127c787608d49d0306250e36f0527b9be41ddaf