Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
6749d618ebb6ff302a4568db5c93f877_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6749d618ebb6ff302a4568db5c93f877_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6749d618ebb6ff302a4568db5c93f877_JaffaCakes118.html
-
Size
58KB
-
MD5
6749d618ebb6ff302a4568db5c93f877
-
SHA1
6ddbe6c55bf75ef0972ba96e7e67a5992cdd9a6b
-
SHA256
88fe453baea259ec834bf98c859f951b50d40e4e3eb45aaa60d0e60374550d8e
-
SHA512
170fcb3346801fa29d7e52e464ddd644546b059510cf73c763af665e75b9923fc07df1ae5cb00c4f7ba586773ba3766ea8692719b3b5b5b9cbb83c760c16f07b
-
SSDEEP
1536:nOnACl52qQ1VjCTx3T6Qe4E+k3ZfLeXWQ4psTSc5DU+r66wvpD2:Oh2+V3T6Qe4E+k3RLM4pbc5DU+r66whS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2736 msedge.exe 2736 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3228 2736 msedge.exe 85 PID 2736 wrote to memory of 3228 2736 msedge.exe 85 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 3032 2736 msedge.exe 86 PID 2736 wrote to memory of 2848 2736 msedge.exe 87 PID 2736 wrote to memory of 2848 2736 msedge.exe 87 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88 PID 2736 wrote to memory of 4120 2736 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6749d618ebb6ff302a4568db5c93f877_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17715256611658356557,8257238109080119820,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17715256611658356557,8257238109080119820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17715256611658356557,8257238109080119820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17715256611658356557,8257238109080119820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17715256611658356557,8257238109080119820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17715256611658356557,8257238109080119820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17715256611658356557,8257238109080119820,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5485ae083b6cc9d84d90f20c6a401da7d
SHA1afcbfe3062ff9acf012752d5ae6544f32f3baf7f
SHA25617b1d95bebcbdc763f20c991d1afe45b23f32d873d0f99b7cc0ef4063f4bf98b
SHA51243c849f2ddaa7563a29b2a4318f04701ccd22ffe84fd8f596d85723dccf58222b56984399f070bb828260604d22ab58274b711bfbd77737a7f5c2513b9cc1fbe
-
Filesize
2KB
MD51421831f91c228023adedb02f56729ec
SHA1ecdfbe4748a491a7992d51b89525623f76ab4b29
SHA256a2aa92b4d31d7bf20a0d20024d8784bb7a8df5804d1572e72cf1a15875bfcecb
SHA51224f7e2fb37fd3cacaea8132503f2aa3f32a55ee0f2afff2bac321f6dc6897835efeeae3240027e592a176feacd3e440f91820d7993f7e193128da4604578b7a3
-
Filesize
2KB
MD5df61397e1b0a55906b3b9f48c5063dd6
SHA1c14efb115226f5fbf4fcbe0450d15c1b7b1f0105
SHA25607419d9e969c41c2af22acb4c8e7cd91287a5975a756787453fe2e477aa7a30d
SHA5129a738e1d9e1216cfd083c415328a7ce6f6f91607026f3caadf65c3cf405c7ab3ab4e4117f5766b513ac17a18cbe91f6c6e3ff3ab79c8eeba9029c9f240fad289
-
Filesize
6KB
MD53291a3a50dddf5e44d5d024202fbf1d4
SHA14a23408acfe4417edf1496c111b6261b42785985
SHA25640b0d227e2202b38ff907ba2a9faca25d230818853e8300e9d6e1991465602e4
SHA5129a31a8c6168326df4532e2aad0bcff5f103602248d5b4da940750870c94455b69b7b98ffee404f40e2e2e22d150d8e8bc0c57cb5ea3a8c3bcbf6f39a05f28539
-
Filesize
7KB
MD5f9cc244f8a3bc79fcabb6027cb96065b
SHA1cd4a3647486e0a73fba88a9809f75f023eeda213
SHA256153106def85ac9b2e091bf9ac877519e0da1dc07ee08f04613406b4dfd018e0e
SHA512d8164123053f3b9b01364ca12609cec13074423fb9d2d85d6c70e5011a77952542766d45d6443becde3204e39ec6a2cab8c1e1321fea6770357bb394bbd30618
-
Filesize
7KB
MD50d038b39c78855be7442e3dfa2432604
SHA1c822fbfa1d10ac16006563be5edc11aa6abab860
SHA25694de3675677f5bd0df8403a26145976ae50daeebad7723b4d8106ab2bc8c0850
SHA51286a97f01a8b8b3dd20c55e9172a98fb8a57da05fcaa34c678656683f3a984f47a255f2ddbf6254e585b6bd4872c42f0ae48f8e2c0719ac60c4880e33913db215
-
Filesize
11KB
MD5afe6ed8eb005266758c3df42882cba8e
SHA14e62e85ff5d9d67c0a98fbbeaab16f2c6985143f
SHA25666c34f23dfa07a54d022e5e6569a63fec60549a6469ace9453753329e2a9b5a7
SHA512f83009d7a66a54c74a90716832f14f5a5f740ffc04bc851d3bbc792b68cd0ea0227643bfbf80709f7edfaf057cdd76469d66b9dc1a201874030d52e506df66ca