Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
2da02a313a432ea23aa333dc6b68120e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2da02a313a432ea23aa333dc6b68120e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2da02a313a432ea23aa333dc6b68120e_JaffaCakes118.html
-
Size
214KB
-
MD5
2da02a313a432ea23aa333dc6b68120e
-
SHA1
4c05dffb380b51c70cab276169bc89ef6f4b32f3
-
SHA256
ec8ebc709160b6c07c86b7e9599bba8d441ad89cc61e5e874cf0bc48b22f70eb
-
SHA512
4c03385e595e95b04eb852978745457b332b0ad0419452046377733175de6ad46feb160bc82738c423e0b2f04ff880e93add613ac620e8e9c73c2c6843fd8de1
-
SSDEEP
3072:crhB9CyHxX7Be7iAvtLPbAwuBNKifXTJR:Ez9VxLY7iAVLTBQJlR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2772 msedge.exe 2772 msedge.exe 3744 msedge.exe 3744 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe 3744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3744 wrote to memory of 1816 3744 msedge.exe 82 PID 3744 wrote to memory of 1816 3744 msedge.exe 82 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 4208 3744 msedge.exe 84 PID 3744 wrote to memory of 2772 3744 msedge.exe 85 PID 3744 wrote to memory of 2772 3744 msedge.exe 85 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86 PID 3744 wrote to memory of 2852 3744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2da02a313a432ea23aa333dc6b68120e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef99446f8,0x7ffef9944708,0x7ffef99447182⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7028630458392950848,4479764144930218404,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,7028630458392950848,4479764144930218404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,7028630458392950848,4479764144930218404,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7028630458392950848,4479764144930218404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7028630458392950848,4479764144930218404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7028630458392950848,4479764144930218404,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5fb3309d83c21f83a2a87fa24414fabe8
SHA14358e0c08fda92d4deca6a27b6f16378bbd56c08
SHA25622d06c1d045e9dc4ddcc75c8c3c07de8ab9099e24f1cf831d87c2c54dc0ba472
SHA512e3580284812f0161cb8d8d0bd2238fe126603a31d27f3172024da61bb6ba70a6e5c1e994275126c0235cf614e0a8f69645eae471527b3b84f880cd7d5402443a
-
Filesize
6KB
MD51a22359796742dd679cc8be6c2a36e7c
SHA15222e905115c07219e5f05af4dd05e309a497846
SHA256ffe20b6291db0943de7d518984b5e6ee25a4c0ffc8e8a3cc6ae2ed6e7cc7e39a
SHA51263ee3e4df36b5e979db08f95b95a8b37afdb3580abbdaf21e5d311fb06b7a5fc91a26968e9c6c193e2996d2407130ea7e62616bf5f15dc754c4404f0de481a23
-
Filesize
6KB
MD530601beda1c16559d949ae71658068ed
SHA1f1bc73e99134f600987296de42d7083e60831e93
SHA256dfd6592515868fb94404e2d19010f03d85374b6f8a78e7cdb6e62e66246c3afd
SHA51210acafab49c6320573f064ef44bd862c4d31d3dccbe8fb9e3e9a11dd5ea1baca03255aa660e558ef0f1bce1573cf8d6574ec186b8f563c5e1106cf0ae9506cf5
-
Filesize
11KB
MD55100a653ba671db21b0f6b7addcd5c72
SHA12f26a1d67babce7d464d65bf960b7253332679ac
SHA2569abecf3508ef3f3ca3bbe64e5ff0d54863e6539b47a446feca0cfb7a7cf0e30a
SHA512168498418ee113f1dc7ff75c66b656c701747ce223413846b7d4bdd9cb6f2055cc3c603cefd58a94748d109c281955f106125050091dee1ba860d88d0f88a6a5