Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
5f9b001795a48e75ec129fdb2b03baec_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5f9b001795a48e75ec129fdb2b03baec_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5f9b001795a48e75ec129fdb2b03baec_JaffaCakes118.html
-
Size
282KB
-
MD5
5f9b001795a48e75ec129fdb2b03baec
-
SHA1
3e988814a24c0aa3529f04e1593cd8546cc8f3e4
-
SHA256
d802e28502443994c38f8a6a77c52e71f4c06a3a88f57354b8876c8b61bb0372
-
SHA512
61e3ffc845f5d57a9d5f4601078d7584572cb3c1fb737ea1f8c7cb2a95f33dd82b8d1ddba107a3c148c5921919e27d3b50fde25a714d49af4f8a5b1fa13fae12
-
SSDEEP
1536:FL5mnwlmpgb/7SkF9aQsTm+mHl0u1AmqmomBm50cEfO:bmnwlmpvXm+meummqmomBm5BL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 4616 msedge.exe 4616 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe 4616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2408 4616 msedge.exe 81 PID 4616 wrote to memory of 2408 4616 msedge.exe 81 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4336 4616 msedge.exe 82 PID 4616 wrote to memory of 4744 4616 msedge.exe 83 PID 4616 wrote to memory of 4744 4616 msedge.exe 83 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84 PID 4616 wrote to memory of 1240 4616 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5f9b001795a48e75ec129fdb2b03baec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd168946f8,0x7ffd16894708,0x7ffd168947182⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,8506290992591917555,11781689655206274925,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,8506290992591917555,11781689655206274925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,8506290992591917555,11781689655206274925,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8506290992591917555,11781689655206274925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,8506290992591917555,11781689655206274925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,8506290992591917555,11781689655206274925,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5e9c8a397acbdba322e216600a484a39a
SHA1984ba813df74b0ffd8efc9c82051151dd14d8f5d
SHA2563a7e0d7f62591edede319553defb3557d1c5484f4aeb38bd448f36c019816dc0
SHA5122466cfe1bbf73eaa42f88c6e46858a363e44819cad027bda60558d5db681825d306936e9ae5a9dff4624917a5c14e622d791ea900984f7cf95eea9b0cf17acb7
-
Filesize
6KB
MD57c7fc27267506f66e714ed00e44f0453
SHA10796bee36ad8c4f9b9b76545d5c202432b3ded17
SHA25671f62a0800e22afdeb474d5da46058282bb1d3e671d1c6c2d728c5a8093638b5
SHA512a42008cecd3297ce504f4a0d307786cab38adf12268244ae5a5e4955e41dbdbc608ec2a4126aeabaedc6a9dd07eae8104dc8943e947550711ff6327639692ad9
-
Filesize
6KB
MD546d15435dfe429636ce3a7c281779714
SHA1cfa7058c2933a52766e69389e1969fd1a3e8fe73
SHA25606170bf1f8ea5aac4931263e9059515b222f0002343e5366953a46c59e887ebd
SHA512429e722eae329ca94b8733db11a1e42f2d1a7ae540be706ea0af2c57a79bb615d7b6576041a3fbcf746e19f27ca59311457a4f1d80ff1b6e37fd98ec93e382df
-
Filesize
11KB
MD5bec0439dc8ab144ca6280f0a8b1db135
SHA1350bc5a20a8fdb1a259173e372d581fef3d6ff18
SHA2560fc3774e9e87779eb3a53674c2bba0057ac0e7c3961c50b8098009cf9b3a655a
SHA512be9fbffdf1ad99812b8bd308e3772f950b2cc7c4910f9decb2da1b9c3f631e8652adcef3365e54965db747bcca6df407cdd4517fb64bed84715b0ac791a79bd3