Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
37e53eb20a8e5faf4d034e96b06e1866_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
37e53eb20a8e5faf4d034e96b06e1866_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
37e53eb20a8e5faf4d034e96b06e1866_JaffaCakes118.html
-
Size
6KB
-
MD5
37e53eb20a8e5faf4d034e96b06e1866
-
SHA1
d908f793a3693ab2883d72461bee84f2881e0dcd
-
SHA256
caa329430e660d7537df269836d3325fbad6cd2d77f73563b96b487a4a87e7a5
-
SHA512
f33062770cb82b810f28ab15aadefc56f0dbb9fc50c607f3aba154985334f11a85be2a38c725cf3849bad33c4e8b8a4372676e59f160c368419146a4b1e3f18b
-
SSDEEP
96:xB9ooyG3bAyKa+CEXr8qmMtumuSyMajPIRFZFZQ4UmrMgViHwicgb69dOF1fMOVm:n9ooyG3UyREFOYieIOS8v5Tal2Phv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 388 msedge.exe 388 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 388 msedge.exe 388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 2068 388 msedge.exe 82 PID 388 wrote to memory of 2068 388 msedge.exe 82 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2852 388 msedge.exe 83 PID 388 wrote to memory of 2904 388 msedge.exe 84 PID 388 wrote to memory of 2904 388 msedge.exe 84 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85 PID 388 wrote to memory of 3168 388 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\37e53eb20a8e5faf4d034e96b06e1866_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd92e046f8,0x7ffd92e04708,0x7ffd92e047182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3274504355724810506,16382415730855792633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,3274504355724810506,16382415730855792633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,3274504355724810506,16382415730855792633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3274504355724810506,16382415730855792633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,3274504355724810506,16382415730855792633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,3274504355724810506,16382415730855792633,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1492 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD573f59216efce77f8e75623af5769bc65
SHA1f86da619d6f826eac93c7685abf1de46e800daee
SHA2564521919394f6e68e17f2569bd68bab4e8cb30ecc9ebacac384c660ddab5e72aa
SHA5124685f297f9f4465f516e4ab1bf6be4120184f01de444df39fc0c24386fae657959bf66f1526cb94a65ba9e2626529c49a62a9e30eb22d7a064d735396dc6c191
-
Filesize
6KB
MD5c04d8056edc89b7dd2676899eb6221b2
SHA1a16aecc0af05e246ec56a75dcf12449b618c36cd
SHA2562c938fe9c0dbbd910716653df4f48aa66d94864fb95d14c70badaf9b834f50cc
SHA512f82bd5354b3f6c0838d8b0e0b8dfe03d49019286bd6fcfc4f1eba76ff6f21504d5d3840d95d688f51564bf48689c12601269448071c17ae670099ac5ffd6bd0f
-
Filesize
6KB
MD58ae252de56594250eed00c01b538b90c
SHA1b284d5fae156722912471d1a47e6fd0385904271
SHA256971f744ecd41b33e9c1d74c7ceec4b39dccb2773fe7b17540fe65edda4a9f93e
SHA512493ef717935382f058b15db0bec3642fe0fbf4ce3f0381dc878a44b533c805c6a98afd6ea747579e6eb6953426d9d7c51da7574d443b27ab85a9ecbefdfa214c
-
Filesize
11KB
MD549bc7584fdabd9b1bab747417d133076
SHA11a56d788fa478c590ca543b6672b486ad069de8e
SHA2568d0ce9bf1c8a0417f29497e6d9e5deb743b2c4325d7856ee1a514433520b15a1
SHA5126bcdbde28a631ae2325cd09d718b6d7d35272f75e171aa8e8be74c0aac1333142c50bb949d9f9c7a1c85e6df2722e7f64d27c35f4af930edd95eca124aabb8a0