Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
64fd711bfce37e18caece4e514c2f41f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64fd711bfce37e18caece4e514c2f41f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
64fd711bfce37e18caece4e514c2f41f_JaffaCakes118.html
-
Size
18KB
-
MD5
64fd711bfce37e18caece4e514c2f41f
-
SHA1
ceda847506f296dabf796d67140082f90c7ed5fc
-
SHA256
0e6f4a9bfceeca7c336b78aea28e847bc4cdb5d48410c68abac27cd5085ac35e
-
SHA512
c0df29e3eceec64759355b6fc2dff6d2c5dfaf1fe8dd5ac760ef46d5a6b69398fce648fb568096532774e2559aac204fb5d8c8b73307732776e1e6edb4a4a55a
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIS4OzUnjBhqM82qDB8:SIMd0I5nvHhsvqfxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 4732 msedge.exe 4732 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe 896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe 4732 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 1824 4732 msedge.exe 82 PID 4732 wrote to memory of 1824 4732 msedge.exe 82 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 4316 4732 msedge.exe 83 PID 4732 wrote to memory of 1440 4732 msedge.exe 84 PID 4732 wrote to memory of 1440 4732 msedge.exe 84 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85 PID 4732 wrote to memory of 4904 4732 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\64fd711bfce37e18caece4e514c2f41f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac3746f8,0x7ffbac374708,0x7ffbac3747182⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6184078166932684980,4156974079060104643,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,6184078166932684980,4156974079060104643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,6184078166932684980,4156974079060104643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6184078166932684980,4156974079060104643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,6184078166932684980,4156974079060104643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,6184078166932684980,4156974079060104643,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD5f0bd8d9db0fece65d509a8ca9a8a707b
SHA1b9648b8870d126f5f8c58855d099f9ebd8d98421
SHA25635aa091fe122f28456000ae8c5be8a252519ea0dda277b336c6f3497ffc5edd8
SHA5121367e18839490d303baea840d15d23bdb8957bc63fdff1421894caa5a80226ea4b80f61aa4dccdc649ee5f1dbbe311f2700d99acae515a48e2f8e1370fa189e6
-
Filesize
6KB
MD5af0bec0b6ca1e6bb774e8d9f26e7ab23
SHA12815dd5d57703d4c9d18a1ecf93c17ef454f5fcb
SHA2569a2e147efaec3e7dbff272ad7af5098832e8e8cbe6f2c5156f1ec45ee1c6ee8c
SHA512cb8214fe97e72dff05efca62e478b70f5020e8f5be39ad21cb36eac7d60c3221d0cb9f6eba6459f2aa98f408a94fd322daf186d4f5f1b99addd463239d025bba
-
Filesize
6KB
MD56c708858dcb58e3c83d8ee0aae67fca6
SHA197d55e59fb36168af632756df01312a9a3d87639
SHA256356eae22ede359d39ab4717e7d729aa78928c97658ac2a5b946dd88a957673d8
SHA512fb142a9993a976eb716a6849f9484d3687083bc029e3fd4ea397f3db093c0967adafba85a156acbc711293ce6f03c3554715003aaf6a5ac9fea20a29f6003ad5
-
Filesize
11KB
MD5e4c31f45277ab74662656cd4c344189e
SHA10bd8d8628405140627d47c922726ecbd4532b9ca
SHA256caf78f4dad79b52efc763783b65ba15883a81cda10671eb3287885c9af990436
SHA51270f6165ae22ff1ff2866d9f05d318ddafe3e8c8b844297e7bc916d24196780cac9b9629991bbffbdc4006fde139e4f9bdc2fa084d2f14999b00e1a3e9a68dfc0