Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
63e8f189c8992ae3c28d5294d092e19d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63e8f189c8992ae3c28d5294d092e19d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
63e8f189c8992ae3c28d5294d092e19d_JaffaCakes118.html
-
Size
139KB
-
MD5
63e8f189c8992ae3c28d5294d092e19d
-
SHA1
ed41d921bac5b561e92d84ae6ecba6f4a1ec1fb4
-
SHA256
ebcdc85e6ad836fca2b164d2d92bd91ac1db6d4d92d5ba9db2848a54e8e5cdc7
-
SHA512
23824323d5d8671f9d966bd1d786e69c575be5c6c7cc20760d22cd57a7edfa75853a8111beed7427fad49b540e41def3937c0bc780d959f5e051d48471ee39d3
-
SSDEEP
1536:Szh00GwxslWiPyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SzBxDCyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 4820 msedge.exe 4820 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 2964 4820 msedge.exe 83 PID 4820 wrote to memory of 2964 4820 msedge.exe 83 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 380 4820 msedge.exe 84 PID 4820 wrote to memory of 1816 4820 msedge.exe 85 PID 4820 wrote to memory of 1816 4820 msedge.exe 85 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86 PID 4820 wrote to memory of 4552 4820 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\63e8f189c8992ae3c28d5294d092e19d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a1dd46f8,0x7ff9a1dd4708,0x7ff9a1dd47182⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6529119783063092948,11810941466173594556,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,6529119783063092948,11810941466173594556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,6529119783063092948,11810941466173594556,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6529119783063092948,11810941466173594556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6529119783063092948,11810941466173594556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6529119783063092948,11810941466173594556,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
5KB
MD51f6916b80ae087850e18243d075de25e
SHA16c771e8238483175bdc377ca9d05c8cebc973b88
SHA25620247da21ddd2ad28efd22e519bd11a3baf1fdeee757622fc1a5374b95445649
SHA512333592836fe442542da1dcec1893b8f5baa330e990d18564ae7659e0ef2e7443461c8a656f84b79a597bd01a706ca5aff8e85f86c5b1edf6d04039449683e6c9
-
Filesize
6KB
MD57e0e1f77ce572236b2b692386a4a6f82
SHA1d579eeaefbe46b61bdc3785011c476ab3941e2b5
SHA2561e2d553a359943db75ab065a3711bca0d910dc9a01baf640e79d6414f85b9e88
SHA512434909217345c8b35a5b19d48d9e1f79a8a56b10493c6d5f2b9420e6bb5b58668f2d8451606c08814ad663aff74db4fbfabb8e68052fed650f3347a0b4d980dc
-
Filesize
11KB
MD5b348b12b7b09d7f755c4a62037e6c898
SHA1d8ab4ff8e8d882a00d08076fc539e173e214420d
SHA2564376f5d9834fbe169be94ed8976cbeae88ea1a9743b2c8d34fbe149f7fc1a37c
SHA5122ea2ca9e72e14c7b42d25c65413cfaac370751c434b34bc7f2f75e9d8aeee4767f7f5bfdffae882d824e51156fbb87b136143c0408cc7881e47087ba220d2b9d