Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
6381767973434691bc012e65019b241c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6381767973434691bc012e65019b241c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6381767973434691bc012e65019b241c_JaffaCakes118.html
-
Size
221KB
-
MD5
6381767973434691bc012e65019b241c
-
SHA1
5469ed2b4bf50894bedfccde8286b23472299ea5
-
SHA256
064d9c440dd9fb6b054f0239586039fd6cb81567faf6eefe931bc7f01b3d1f1d
-
SHA512
bed45fed07d1fffde61339d1c1a8c590d04ed2f87b48ef0981b97e89b295709767c4656f4b8ea3576976386b1b4bd16131398f364c47a15ce489b9636bb7a539
-
SSDEEP
3072:STReMcX8iDE65zFxHyfkMY+BES09JXAnyrZalI+YQ:STMN8SEUFssMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 1088 msedge.exe 1088 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 4820 1088 msedge.exe 82 PID 1088 wrote to memory of 4820 1088 msedge.exe 82 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 5076 1088 msedge.exe 83 PID 1088 wrote to memory of 4832 1088 msedge.exe 84 PID 1088 wrote to memory of 4832 1088 msedge.exe 84 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85 PID 1088 wrote to memory of 2424 1088 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6381767973434691bc012e65019b241c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff99546f8,0x7ffff9954708,0x7ffff99547182⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15910852570129770184,16965100075870249848,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15910852570129770184,16965100075870249848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,15910852570129770184,16965100075870249848,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15910852570129770184,16965100075870249848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15910852570129770184,16965100075870249848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15910852570129770184,16965100075870249848,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD599e21f67ccccde7421f8ce53bda47b41
SHA162f68048a005ef3d591857218020967ff20b8d3b
SHA25690aa71e93972223fbf71ec5619e2e03e3b1f4542fa5529de69e6a94138c45543
SHA512270a144d7eff3205a2532b4462f34fc121f98cb94469d3c1fb8f2a9890f3d82c53da69e9f86d983fbd507a1ff906bf8885d630e111d3d0b534ef23ca8ebe5661
-
Filesize
6KB
MD5e69a5602f14290f89be7b93ae38cb6fd
SHA1d5a2f6512ac315046bdffedbc5c380cf451581ab
SHA256e51687485fec6117e46354d8146a4f5b73e9b9362466cc52fe400ac49143c0f3
SHA5127b0efff675c135e77415342121a43239bf7cde0b67712addde22b58511cc63b16baba3a8924f31ac016179f28f88734cb27d7bae8fa5692dcb8c68fd8a5f547b
-
Filesize
11KB
MD5b129cd42aa37a8c18dfb4d86a1756e61
SHA1bc37910f126a72609e85bb44ac067b00d15060b6
SHA256d76813847a7f0b04dcee72663af549fb5697e27453f50f8d7d93f984a546e59b
SHA512792197cdcee7e4714ea0d0a675142fb079d33005cb57587e4bf36d715ba845e4e09375bac2bae080d7a177005de9241402369d34e9764a2da70d8fb1ec7154d8