Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
711740692f8e29fa502070640c61df4f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
711740692f8e29fa502070640c61df4f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
711740692f8e29fa502070640c61df4f_JaffaCakes118.html
-
Size
86KB
-
MD5
711740692f8e29fa502070640c61df4f
-
SHA1
c1152e7cb445d458eb0b09b4610d15ca38a682bc
-
SHA256
5f67beaac854dcf488e97f4322ab70f8a62186a42959225c4cbd2f364659c8d7
-
SHA512
d04ea88ff786bf6fbfdbd3a96de75cfbf81bb66045c8d9702dd52e832c8f6d2d7e4634d4ad685d548474aabffd0b429844dc9e809e09d50fcf2234256b04f073
-
SSDEEP
1536:RHsGVdVCxV+DXjIaKCUxLVxJ2xJmxRtWE1lVNedasQVdCWGV2edWPYVjednSIV/2:+GVdVuV+DXomrzIbEqzHU7cx8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 456 msedge.exe 456 msedge.exe 4420 msedge.exe 4420 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2196 4420 msedge.exe 82 PID 4420 wrote to memory of 2196 4420 msedge.exe 82 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 2836 4420 msedge.exe 85 PID 4420 wrote to memory of 456 4420 msedge.exe 86 PID 4420 wrote to memory of 456 4420 msedge.exe 86 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87 PID 4420 wrote to memory of 928 4420 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\711740692f8e29fa502070640c61df4f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd92e046f8,0x7ffd92e04708,0x7ffd92e047182⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,11194565297746156780,15204321997760715537,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,11194565297746156780,15204321997760715537,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,11194565297746156780,15204321997760715537,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11194565297746156780,15204321997760715537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11194565297746156780,15204321997760715537,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,11194565297746156780,15204321997760715537,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
108KB
MD5cf7374e7e4c8fb06863dc0edba52f63e
SHA12a580c5dae6aabd3cc04347e4d3d8419fabd96f8
SHA2568394cab419912b41405da6589f0ffd7f1b866d023977a5ea2b8943cf45e58a0d
SHA512ebe4d8128c8209de53d3627f58aa175ed071edb9093369c211203dd3aaa2a520eba46724314ffd86d19d6cdc0093237ef1b1e1e62b55ae43b19277e373e502ac
-
Filesize
184B
MD5bd9693967cfd1f70736af0369d972a57
SHA10d12a77858e93306ea70b9f1436aab662d1c2569
SHA2563a00212e4a38aa5746c883c6e9d628552b3df25066148ad79fd4502f27245b13
SHA512cd4d930f52c31bdf185df00421d08ee3e7ce8350b2045976d9f706ab61f00ae07bedc272e37ea8fa81a646dcd3a2bd8d388e41ea82aa2c5ec8473fc99816b306
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD578611520e96d99025308844f15904be0
SHA1862faf3182e6264d7c510daabd3f58897d7ce08d
SHA25630de50817539e3e62852dd4bb83e29a8138fcb4ceb7f05611aa4bf13457c356b
SHA512ce24ab19e548c923cda26c8c451d0f90462980058ff186aec162bc7220fac70132b5a7e7df434a1cb3d2b0cc75d16acb16d9eb9d6039dba157c1e65f093300b0
-
Filesize
6KB
MD5a977b428ed6d79065a3b9f8f313633a6
SHA1eef79f2d6a1de7c587b1e33e0cf8dab92441eae3
SHA2565a8ba1e9c4dc1f77bb67d115ce169d04f7e7fe5f51c8da0327fb220a4bb97e80
SHA512b48ae1ed51612f6f8c1b52489bbd51405bf112fc2cd62a36d9851dce94cce4683027124a66dd6c1db2b6c71a68611f0d95f56883d3013cf0b841e4dfc9d5392f
-
Filesize
11KB
MD5b649dfe63177da77b8cde594322fb309
SHA155e59a549121f9717aa24fc7b794b292e6ffa334
SHA256ee04e0d2d69875853f408f56eab8110520a0f85662c7dd523acc013b73464905
SHA51266abc53682c54961a56813cf11dac7369d796e2dc94efb6ea44922b855794c6c2912912b402dcdc0ec72c006ba0a2e291dbc467e88b2bb0e09d7b685a035f8e6