Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 19:26
Static task
static1
Behavioral task
behavioral1
Sample
30a8d0634702878d9380eb30e6099bd1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30a8d0634702878d9380eb30e6099bd1_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
30a8d0634702878d9380eb30e6099bd1_JaffaCakes118.html
-
Size
218KB
-
MD5
30a8d0634702878d9380eb30e6099bd1
-
SHA1
86c9d8c68acc61144d0b975ce6d148b3260ded89
-
SHA256
e13954cb971e9fd0c8c42e0d3e2bd6f7e0a326a970745baf40bddfd2fff89d51
-
SHA512
29057174fbbc458c50c3ca11403f0d4cac531d3f96715e408656ea5ea2c450e3aab41d30637a93e76fca1c6538f289a38e82c9bc335e7f7be87ab5f9d0f2f425
-
SSDEEP
3072:SJNadG5wZLTOhCLyfkMY+BES09JXAnyrZalI+YQ:SOc+ZBusMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2812 msedge.exe 2812 msedge.exe 2344 msedge.exe 2344 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 216 2344 msedge.exe 83 PID 2344 wrote to memory of 216 2344 msedge.exe 83 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 692 2344 msedge.exe 84 PID 2344 wrote to memory of 2812 2344 msedge.exe 85 PID 2344 wrote to memory of 2812 2344 msedge.exe 85 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86 PID 2344 wrote to memory of 2092 2344 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30a8d0634702878d9380eb30e6099bd1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff16cc46f8,0x7fff16cc4708,0x7fff16cc47182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11107809919661272001,4600824944289707467,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,11107809919661272001,4600824944289707467,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,11107809919661272001,4600824944289707467,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11107809919661272001,4600824944289707467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,11107809919661272001,4600824944289707467,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,11107809919661272001,4600824944289707467,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD562626da6123d3c9ebde64e847a52c2ac
SHA14f9372d8e61df6ebfa5f5db1abc86bd97f38ebbf
SHA25625629a7ba8364942f4a9daea76c3b14de22499e6342f326f7ed1283a7f985fef
SHA5122ee8c7ce6e6c636b979900009b5849ba53cad74e0228dad9c81716fada504b0a2317a151d21d4643df5d05dfe0a41afdcc0fb85c1ab26f9781d30f3c805fb63d
-
Filesize
6KB
MD5bd5a1df12ee2c1af87decceba98c144e
SHA129943415a2c448e6e66a0f2c30c1660aeacd0c31
SHA25627d38dbee1d2d01f2861f619fad2be85cd4824d21810576300a851dd28229c27
SHA5127f9d0e9dfa1dcecda133d7672d4258536a0e12ec75caaef17510c62f71ddc126194c768d3dbbab4adbeab8faf20af3163d78d0f33d8cbba4931944b31beaaf64
-
Filesize
11KB
MD5bea6bcc6334878b2912bf93d2fdc9f9b
SHA1515d069b4c93b58af8c78a9cbbeac1cd4d948c1a
SHA256d15d89c0c5df000e960159e1b472580a57d9f43fdfcf814d173d606783117547
SHA5122ab416048bd00bb5e57e8f37e4882e32942dc57e69b31c937fefc671b4af22f31c7f2515d0ae1cb26e7da278900b1f556d1e27718177076f64eaaba410c21dc4