Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
4be6fd5346369e350efe085355f86985_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4be6fd5346369e350efe085355f86985_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4be6fd5346369e350efe085355f86985_JaffaCakes118.html
-
Size
140KB
-
MD5
4be6fd5346369e350efe085355f86985
-
SHA1
e5d7402a2547ca3176acc51c36a08dab6cdc3999
-
SHA256
b37aad5d7ca08c9c8a40eb7b6084eb882338ef5db646c3ce9e45db1744721b48
-
SHA512
5917f5880991c3c0e06606c5fc3aff23822c629558e104e360ead58835de733dc755b985b49151ccef06e632882be1dbd7b159a56d98ee641e64f9f11bad11a3
-
SSDEEP
1536:SVh4J8xglVgyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SVLxAgyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 1204 msedge.exe 1204 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 4500 1204 msedge.exe 82 PID 1204 wrote to memory of 4500 1204 msedge.exe 82 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 2180 1204 msedge.exe 83 PID 1204 wrote to memory of 4840 1204 msedge.exe 84 PID 1204 wrote to memory of 4840 1204 msedge.exe 84 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85 PID 1204 wrote to memory of 400 1204 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4be6fd5346369e350efe085355f86985_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffee01646f8,0x7ffee0164708,0x7ffee01647182⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6923948622172800762,10361039603972181557,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,6923948622172800762,10361039603972181557,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,6923948622172800762,10361039603972181557,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6923948622172800762,10361039603972181557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6923948622172800762,10361039603972181557,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6923948622172800762,10361039603972181557,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
5KB
MD5632ae26f08d68141370ae04fa6674833
SHA17e39dfafa5e6dc0395cab22f3de170ef4412bc75
SHA256ed6aac1751f26b2ff39a4347b9dfe23b43b4f3d3b2320cb14c083ac963a3a361
SHA51212be9867a871cbce6ed7ce4d88ec733bcb04d085cdbabab5d766ab45cee4ca8534ea2c4f291ba4fec57fb8b5d1fcbfcc38385fd58c91d2fe3cb4d638fab526cd
-
Filesize
6KB
MD5ecadcd56cb89f3bef9488a305d90de93
SHA1df3a9853f4c6b0e5e4869f9ff30c52ba69dd3280
SHA2565f9536f436c299649a394f1972297a05f0a936aac310dc50e73c6b2ee0f85a8a
SHA5124fa139be94632a9749e28de930129cbc4b128be054f757a69d7ab59f3dc267b30489008130acd83d7810c3a42d927ab31765c6ccb9fb6b6afaea7e490c7e4c87
-
Filesize
11KB
MD541e2fe588cd69170970865520bea809d
SHA1c6b9b0d614bd8609b026bd9c07c856bfb0caa4ca
SHA256dabc826fe9ca16c07d516ab5357f8e1b3c5879f8551db7d966e375231e214021
SHA51241e36c93200735a23a9cb3ace09e1e5c02ee93ce4a17ba62308b9518e5f0ddf91e58543653cefc4317606e20f8f54161b9b9fc71146077e357434d0ea1ea64e4