Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
4aad1fe3e8994bd84365dd70b4d5bfc5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4aad1fe3e8994bd84365dd70b4d5bfc5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4aad1fe3e8994bd84365dd70b4d5bfc5_JaffaCakes118.html
-
Size
139KB
-
MD5
4aad1fe3e8994bd84365dd70b4d5bfc5
-
SHA1
ed0aed016bf5f57a4344fa5bb35818ec2b51cbf5
-
SHA256
bf631558285c556c8c1c81949d83520230601cc8b8f4864aa01610b031be7fbf
-
SHA512
1be98907bf25fdd03ca6a19bbb6f0443026b70c5af9b201daac7e2a61d52809b5baf4d1121c61e4e3e3c58caec45dfc02cdb038d57f7ead3efa42dea7168dcee
-
SSDEEP
1536:SIN6p3lzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:SIMdyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1160 msedge.exe 1160 msedge.exe 1244 msedge.exe 1244 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2296 1244 msedge.exe 83 PID 1244 wrote to memory of 2296 1244 msedge.exe 83 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 2856 1244 msedge.exe 84 PID 1244 wrote to memory of 1160 1244 msedge.exe 85 PID 1244 wrote to memory of 1160 1244 msedge.exe 85 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86 PID 1244 wrote to memory of 4884 1244 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4aad1fe3e8994bd84365dd70b4d5bfc5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa996346f8,0x7ffa99634708,0x7ffa996347182⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5645850427708020428,17494751327004510158,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,5645850427708020428,17494751327004510158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,5645850427708020428,17494751327004510158,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5645850427708020428,17494751327004510158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5645850427708020428,17494751327004510158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5645850427708020428,17494751327004510158,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD5f8bb0e0384e117b911c53834dc423a9e
SHA150833835ff89ef081e554a50e3bf73d8761bf919
SHA2567f01fc8b93121e739f0b5c3bc7fedc193303b712309944f9b4695b707e27882e
SHA512ed8ab6e2cd8f2ab6b3285010d98715f310edff93ff9853c7de289d70f0e5f23b63a5d91fb6df90795f20e7e153077300ff60f8784ebc6dfe6e9effe7ec2b5fcb
-
Filesize
6KB
MD5f9a1fc985d30433e472e0a574263d684
SHA114a1b67b3c6d2fb09601a7d762d4b27470ef4ea8
SHA256d375973174ecaff8a777068b111e8884485389e84270137dcad59402aa9d15e0
SHA51278be0a7549e2ec954805b5f5dfcdd8452ad624de7fc5ad9c0392cfd2a2e15e56fb026a5669a7ef2f92e0a3c71285d53a63c6ad59276e96c4439724f04b182237
-
Filesize
11KB
MD5f7e14a928d3ed6fe879f39675dec3821
SHA1d1c69ea862d0e5c20478a95f5614fd7bcf358c04
SHA2568956a77aa89e4720a5abd3f6f7c22733d028e3c7bd62156972c2e1f81fdb8f17
SHA5124331902f630b7f4982d7b9e7f9a50de2bddbb143a308a23df79368db0c09e4f0948ab43f42628a887e74b4fba7d50a623e1b3bf17ec4260438e5bf0dd8e89407