Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
45a7f21c6563f658e46297bda281dc12_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
45a7f21c6563f658e46297bda281dc12_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
45a7f21c6563f658e46297bda281dc12_JaffaCakes118.html
-
Size
213KB
-
MD5
45a7f21c6563f658e46297bda281dc12
-
SHA1
750d17c71aff5dd28da603d33e8025fcc208d841
-
SHA256
3f048a754a17d3e14abc353c13d3da46ff522de6e519e0dab6f3eae3e6f3bb37
-
SHA512
87cbb36d774a4699f42987ee597aaf400e94ccf218dd21938789b2173d6ee3cf1c8003674202df610f6ad49828298bbe75d1c9301d6013d74805a1ab4d9fdf0b
-
SSDEEP
3072:SruxoPWgkEJ0McabyfkMY+BES09JXAnyrZalI+YQ:SruckECa+sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4620 msedge.exe 4620 msedge.exe 1312 msedge.exe 1312 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe 1312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1312 wrote to memory of 216 1312 msedge.exe 82 PID 1312 wrote to memory of 216 1312 msedge.exe 82 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 2460 1312 msedge.exe 83 PID 1312 wrote to memory of 4620 1312 msedge.exe 84 PID 1312 wrote to memory of 4620 1312 msedge.exe 84 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85 PID 1312 wrote to memory of 3448 1312 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\45a7f21c6563f658e46297bda281dc12_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3178216830033125144,5475117789499991135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,3178216830033125144,5475117789499991135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,3178216830033125144,5475117789499991135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3178216830033125144,5475117789499991135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3178216830033125144,5475117789499991135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3178216830033125144,5475117789499991135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2c687fce-8804-4377-8018-063d6136cec8.tmp
Filesize6KB
MD571775a767c4faa880815f1b60454e34c
SHA1203e6c8cf357fbca4c69f0d06c3e96b74a50b5af
SHA256837e9dbda39ee756276c58c95ca70a64dbb79d80c1ad81516b1793807602a142
SHA512dba8201f31656e9f4c131107efc1a45ad222f1d93fbd2b963d382a43b1232a476e74b0c806f2078f6d230944f9d5be6621a855b718cc449162ad858d26f86ddf
-
Filesize
6KB
MD5e6c0587c3b0bb6f5865fc45141f1a742
SHA14d26e7c677e7a7bd10873699eacdac095160964a
SHA256a6671337dd7ecf35c6536560be222e68d43dab579e1d39b64979a0c56fb23dab
SHA51286e8450bcc4f7bbd98fb33663307d36cf2bdf8cf912cc1cd0f56e487987b48a9dc7bcc4b8bbd158e39ff37564cc13429c5a7c2065d095694ed8b34b4a7299f52
-
Filesize
11KB
MD56fc0d196e287e54bacd005460a3b7de5
SHA1314bca42bc8061f60a0744155f04843af40f6d1f
SHA256a2511287cde0df25791ca80d7abe866f868a040207004b8e5f42ae42121d148d
SHA51281e57e4d4f909db9cfe8b33fe820863a3d32d2f14f4db0ecb67f2d3bbeb7065fd70aeb8b06169b61564c4356f8b9791e05418e3bc7c4b04b5a98642939d79a2d