Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
64103df24d3b7b25c2d2465856cdfea7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
64103df24d3b7b25c2d2465856cdfea7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64103df24d3b7b25c2d2465856cdfea7_JaffaCakes118.html
-
Size
193KB
-
MD5
64103df24d3b7b25c2d2465856cdfea7
-
SHA1
bf2856bc44aba94e53b2ec72dde2124c067709cc
-
SHA256
dbf3d1233c05addadd760c087839469dbd6c7324b952cf386ae366f4864a484b
-
SHA512
627c76d6f9ff32bc75c05180fb1f819be294472a9c2c57f53ea6694713af883b029c5f07465582fb106da13dc76e9962a1a2b7132ed3d22f86d57a6e236141d8
-
SSDEEP
3072:SMifLKzKM3yfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SWOMCsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4100 msedge.exe 4100 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 744 msedge.exe 744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 4984 744 msedge.exe 83 PID 744 wrote to memory of 4984 744 msedge.exe 83 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 3720 744 msedge.exe 84 PID 744 wrote to memory of 4100 744 msedge.exe 85 PID 744 wrote to memory of 4100 744 msedge.exe 85 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86 PID 744 wrote to memory of 4488 744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\64103df24d3b7b25c2d2465856cdfea7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb7ba46f8,0x7ffcb7ba4708,0x7ffcb7ba47182⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9091103528221986948,2615624503554259505,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9091103528221986948,2615624503554259505,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9091103528221986948,2615624503554259505,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9091103528221986948,2615624503554259505,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9091103528221986948,2615624503554259505,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9091103528221986948,2615624503554259505,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD534749097fcc15593effc1200e334cdb2
SHA185bb44a4388e96880c4ad5688264dc6855dfba7a
SHA2568f832dab291babfb6beb285ba33bc34f7091780c255e529fdd66e1f49a2f10c5
SHA512ae8f021fb4eb3c23ef60778d15b5378817f51688508203000142d7a7329d5fd2e4757483580c651250a81d339b3ed2d5724694f4ca780d8657d82c56abddb611
-
Filesize
5KB
MD543c2000643b1a261b913888dc7e96efc
SHA117f657d50b603f196d71587a9dbc8cd88b2eead3
SHA2567a1f9d0b4fd82696100d2be57c1aefa29c5dc1cbeb043c1640cf9ab73c9a1de0
SHA5127b19a2db73e5da192b6686d8c5b9bfb79c7e5afbef0c4744c24ab11e32b39b0d29ec0f8f545071833c351f0ffe2c8b86fca45d1f1f9fbb85f4f9fe751fc351a6
-
Filesize
11KB
MD5d1dd885cf57139c3a90da6dcd737c519
SHA1fb2d005fa236316518b4442ad25d938d1fcec877
SHA2567d0a81d9f0e35fc2d13c666d5978296164a766146a0c8a60d02f830b3b872d3f
SHA512f5ed613100e70244d8a9a5953256a831e6efc1f587aca41e6a9aa3b9ae5a893786e810cceade51906f895824edc84b5f2a44513e3a2479c7b21e6dad22752805