Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
336a4a6be9c20576d85c6a967e90291a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
336a4a6be9c20576d85c6a967e90291a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
336a4a6be9c20576d85c6a967e90291a_JaffaCakes118.html
-
Size
142KB
-
MD5
336a4a6be9c20576d85c6a967e90291a
-
SHA1
ca99996133a80551d90e39cd09333cc7cb7e0d81
-
SHA256
06828951d539f6358514d80c3adcc91dfae3b63c73d8e47fb0cf7c1f611d4cc2
-
SHA512
18786e90d624f1dd190ed7f48acc2a95a20ca82f723bb48ca8fe2068f6275a03c68d2e8b472a12dfc773851ec65e1cd5ee376c6be40d78576b660045ff9cbc17
-
SSDEEP
3072:SYAQw4Gx7dyfkMY+BES09JXAnyrZalI+YQ:SYAQGx7osMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 3980 4732 msedge.exe 82 PID 4732 wrote to memory of 3980 4732 msedge.exe 82 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 3496 4732 msedge.exe 85 PID 4732 wrote to memory of 4864 4732 msedge.exe 86 PID 4732 wrote to memory of 4864 4732 msedge.exe 86 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87 PID 4732 wrote to memory of 1476 4732 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\336a4a6be9c20576d85c6a967e90291a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffbac3746f8,0x7ffbac374708,0x7ffbac3747182⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,5611645897544712508,3019465168841420753,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,5611645897544712508,3019465168841420753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,5611645897544712508,3019465168841420753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5611645897544712508,3019465168841420753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,5611645897544712508,3019465168841420753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,5611645897544712508,3019465168841420753,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD55c9afc29047c3cc7589c064dcb238eeb
SHA1c5010152bf964250fefa70a31823471fc5080653
SHA256953e7f2eb87d65020c0069cb8440914ae49d63d30b48ea5a936e22cd814137c3
SHA512028753275980555e0a5f3b01aaca3ecdc4910acd5e7d04672135badef98921a9643b5e57b41151333756c1d9e96fbf27559d6a5fda9e449f82a875255829b418
-
Filesize
6KB
MD5983271fd48decd393be9d36de754839a
SHA1dc96dee1f1e506765655bd629c67d27abecf698e
SHA2568866b1d25fb19cdb71e93df720b83465ae65f45c7e5ce3843652d7943a9ac3ac
SHA512276b92ffd2d52e54a75e378f3ce70849b83612c3700d95093c816763656df5b0dbb49d7b578e4623ea666d2cf12eee217d1c79bda27a9e14fb24e0755fef17e7
-
Filesize
11KB
MD57a5f9f87e6fb6477a6249b442f8dd781
SHA1bc5c2922e1f9c408b2379a1b36b9f41343824e5d
SHA256ec89c1692946afdb37e7b84284a022ff7a1b6e1aeabab2d1e4e19964fa56879c
SHA512046a8c6154b4afe2c7ded2e105c65091a1b247663ebf9c519f4c60355905569c0264e281e31e54d9de981ce0e2b98a16e65fd0dfe09c1f65ed554cf4444fed11