Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
39eddac0bf914918e368e8de5aa2c3ff_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
39eddac0bf914918e368e8de5aa2c3ff_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
39eddac0bf914918e368e8de5aa2c3ff_JaffaCakes118.html
-
Size
142KB
-
MD5
39eddac0bf914918e368e8de5aa2c3ff
-
SHA1
0095e8a93f4b0d84ab549c1f1b88f976a8243ae8
-
SHA256
a136a2cd0cadfd4a6773f39ec5eb8e7381a1fb4072f618f60721f27fc9b7a863
-
SHA512
905459b10a70b6ba76bd50d57b5317ed881c9a5b257e7d3737de95c6238890da8ffe58b35192df260cc36fb78d40a9eca476f43d2b8b0be075875e56b863e8f3
-
SSDEEP
1536:Si8zROlBJJx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SilVx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1604 msedge.exe 1604 msedge.exe 1376 msedge.exe 1376 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 4516 1376 msedge.exe 82 PID 1376 wrote to memory of 4516 1376 msedge.exe 82 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 4624 1376 msedge.exe 83 PID 1376 wrote to memory of 1604 1376 msedge.exe 84 PID 1376 wrote to memory of 1604 1376 msedge.exe 84 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85 PID 1376 wrote to memory of 3920 1376 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39eddac0bf914918e368e8de5aa2c3ff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8030d46f8,0x7ff8030d4708,0x7ff8030d47182⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3041933571399620026,7789703448767333877,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,3041933571399620026,7789703448767333877,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,3041933571399620026,7789703448767333877,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3041933571399620026,7789703448767333877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3041933571399620026,7789703448767333877,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3041933571399620026,7789703448767333877,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD584fbae0c43d7e3b2382f69bc71037347
SHA15e071af089cf55981042fa44602ba1aa5294c7b4
SHA256c5c842456aa28eae3e1a02f190d13f015788334bd88978d893655ee1da7a958c
SHA5120f99c48027e987e3ff55a163d4ec98986e39697ca9954b8f7b976b2a641315c9c27ae29c38e8e0e279589958bde3c509220d48d3161dd0f77c66e340db336f73
-
Filesize
6KB
MD5291d166b8f9dc5e8fe7941db3b1e500c
SHA11fc4f7ab6d9c6e51facc77633d9fc487683bec34
SHA256dede7da066f4834aba4032e5d370b1dce0a526148ae60b3cae5e5a285da291b8
SHA51286ec534673afe2d69a6aad7f2ed41a514172a6c9d94e02d8e4b128c9f4690cd9c566433744d7d7166cecdce754c975a685e4a568d3a56deb35e1a1bd16e171ba
-
Filesize
11KB
MD5cb0ec8dd1f5dcc3e00804b1fdcee6fbf
SHA16f7e34994122d92952d26573ade3e11103c8a890
SHA256b2025732e9215a9ec0b39cd0f2afdfac67e4307ff28b01e9f82c8f93c249790c
SHA5120985e932f3961828e6cdee852cd322f89fcfbf0244a2af7435dcbfd4608b403257a084e17961ba463d4cb68a5863babab731157d535b9d91b9604a5a6cf6603b