Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
698aa31a152485dbf13bd367393703fa_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
698aa31a152485dbf13bd367393703fa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
698aa31a152485dbf13bd367393703fa_JaffaCakes118.html
-
Size
18KB
-
MD5
698aa31a152485dbf13bd367393703fa
-
SHA1
554092b9937dbae804fdcc7d33e069fc3763dab4
-
SHA256
69ce0c21f3f9fa9f3988b094648c082521d6a32b0d919a9d3cd3d7a9592ba23b
-
SHA512
074e1d359929b2fd2c78b621e86e6f2c5badb602c4686ec1e151d2d6a7fd8ad3c63c2bdca0dd8b8cae5cb75ae58df5016f0a0f7e30c4fad38e3bc7502d14ced0
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIe44zUnjBhkO82qDB8:SIMd0I5nvHHsvk9xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 3728 msedge.exe 3728 msedge.exe 5356 msedge.exe 5356 msedge.exe 5356 msedge.exe 5356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3728 wrote to memory of 712 3728 msedge.exe 82 PID 3728 wrote to memory of 712 3728 msedge.exe 82 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 5136 3728 msedge.exe 83 PID 3728 wrote to memory of 4528 3728 msedge.exe 84 PID 3728 wrote to memory of 4528 3728 msedge.exe 84 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85 PID 3728 wrote to memory of 3204 3728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\698aa31a152485dbf13bd367393703fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff427246f8,0x7fff42724708,0x7fff427247182⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11491700400794908317,14064028708856704291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11491700400794908317,14064028708856704291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11491700400794908317,14064028708856704291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11491700400794908317,14064028708856704291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11491700400794908317,14064028708856704291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11491700400794908317,14064028708856704291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD520c2954d8efdd4c0cc685addfd3d2bbd
SHA1ea184f0bba8a5b62babac99406d4e6a984e4ed73
SHA25656a3c307e9c6aa9eae822eadd8a9a741e1db50be194983612fb893cc50650d1f
SHA5125e30823fd6b1738919a6fe6e0ac3e8f680d5140d4191512c013d1c38f3ad8c55b8ce020dddad72f02541565ec0326e26147911423c731d445be5645a7091a582
-
Filesize
5KB
MD5edb09d0176f55a0901f9e86f22b85238
SHA187542db4bd8cc9e1d93cbffe9af3730bae08b961
SHA256f83a8cc77f749976961db94f78f2217055ae523e0c573218e16ee83ddeb7b5e2
SHA5123ef067675cf98a51a0b44989fc01bedf57f24085d95ac375dabd74d77df7c3f33f3a5cae59ed29d0edeaadf91d5b23d9acefcd5a0b9a5d32ac539781fd71839d
-
Filesize
6KB
MD51d90dd4cc5b549f3f8981178d74ac7e5
SHA18d4483b0ea764d0f15649369583325918df59894
SHA25698f7cffab6fb58984266d619473cf4d89e831f1b203595402ca7bcad7adce29a
SHA5121cf7298b84a8aa720e2a7034aab3d03dfc48cc4c5f71226d722a5e8fa1932f87ddf9a3e9f989884550b91572ec0c807caabcc75eefb39189680146afd674b202
-
Filesize
11KB
MD5b91cc598308063ed7a890db0f8e7a0c2
SHA1055e677452f0bae8197c422f94729c0a9bc98181
SHA256dd5b53af5cddd72d0519aaedf3ec5f26fe28f129d1a9985b017b14bcd84e6e6a
SHA512032bb609b45b8cfe9b33e3f62b17960ee5cf0b3a78180af7f1e58728d664a6ff0b7dda5183d9034335d5f888de6b5daf3d1139145614d77ac855379003f996b6