Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
6d79027109cd3d4ef49fb8c5182e65bd_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6d79027109cd3d4ef49fb8c5182e65bd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6d79027109cd3d4ef49fb8c5182e65bd_JaffaCakes118.html
-
Size
40KB
-
MD5
6d79027109cd3d4ef49fb8c5182e65bd
-
SHA1
022b7151857997b278a0c75f94645ec096558a92
-
SHA256
77b1cad604f82a07a5924063e7cb0445c662f529ca43c6004c6afade3221d22f
-
SHA512
cea63eae70eca7b4dc4eee2df41db0740ddecd431b59060681f1ac9738ffbe2a9e227b21c43b690cb7e025ce3117632023c99edd16df934e5a814b2c6ce2d860
-
SSDEEP
768:H4of7POQtj0W6r6f34QAOqhdlqY5B0XQkPpL3k20XVEuFV0XV4aq+:YofTLtj56rrF7zgQnrVEAmV4aq+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4948 msedge.exe 4948 msedge.exe 3104 msedge.exe 3104 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe 3104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 2848 3104 msedge.exe 84 PID 3104 wrote to memory of 2848 3104 msedge.exe 84 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4816 3104 msedge.exe 85 PID 3104 wrote to memory of 4948 3104 msedge.exe 86 PID 3104 wrote to memory of 4948 3104 msedge.exe 86 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87 PID 3104 wrote to memory of 3892 3104 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6d79027109cd3d4ef49fb8c5182e65bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5c0e46f8,0x7ffa5c0e4708,0x7ffa5c0e47182⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,7958829943827960376,17232813258514171589,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,7958829943827960376,17232813258514171589,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,7958829943827960376,17232813258514171589,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7958829943827960376,17232813258514171589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7958829943827960376,17232813258514171589,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,7958829943827960376,17232813258514171589,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
19KB
MD52bd5ff47201c524c33545c154446926d
SHA1edc55cfadd8d17b5c83dd3cdc1e7bbd1ca16e643
SHA256b72bf5dbd932b317bf034fb0a8d1bf0754d22319c5b16b055ccc71577f5cd3f8
SHA512a0430c90beec81fa0d54f843c76ddde9dee5d04c7c1f24b7e4ec3cdd63c87698e0cd3bd07aef3d7a2cb1e5ec4d2873ab5c12bd7554891dce5b8c2d60206e47b6
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
394B
MD5e0be8cc2bb3827e33039fde79d37c379
SHA100aff680a13a14540d23ae984e296988513cf269
SHA2566ec860b9e47595e529544cfa6d3a34604bd201234ba3036d5b5a01c4149c31e8
SHA512739603302cf86bed0df44944a7903a7c30f1de9f8d3bbbcf6366affd72ea738a5af2f464d68af1d607323d8f513e31c6fa39baf9570a643638a6261f4201e023
-
Filesize
5KB
MD50b44bae90da993f217a6676f2dd9186a
SHA123c3d35258f15e5b603ff1e175d76136ca5569c6
SHA256eac502ad87ea3b48adeddc41ebed0ea6ce4d20272c09a0fc2cfa9050de66c28e
SHA512fc7451cfa1c3724a0f0440c90d714803fbd91f25dd593af67ffda3afb40475db27485e2ecc3e6830b3b8e2fb9bee1aa6f35e1d81c2104a5b8b0d74c68ba7073e
-
Filesize
6KB
MD5f5c8cef5d39dbe6dd6f1f346a2f97bfd
SHA19405ea4063644beeeb0577aa73807f057d3595c4
SHA25647b55f7217ec015ae74bc52086b53ae8ad25434042269369e4e697388056279b
SHA512d3f37175e7c5d775d730fccb9723f6563fb2a8d53af92877508b4e4a35ded93670f5aa4a31d159ac76f63aad936bf6497ee881f10efbaa7aa47cc401d0fd54e1
-
Filesize
11KB
MD51212506079654cc094d2c690a26d1fc5
SHA183713502b9a247e6eacdd21ee4ea25a40aa7003e
SHA2567b6f8cb53029a494bcee22eae358218a811e72ed08e98b69361b670eedd5568d
SHA512de7ec491d278508654e9824ba9b9e38f8540da3aa75fc3b4f5309101dfe64e1d7a93c6aa0443e7d833bd8d3c5eb9fed2dc4529ee2202e8bd555ec5d6de978731