Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
7567cfbeacd96c1f21874c3658d3ed9f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
7567cfbeacd96c1f21874c3658d3ed9f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7567cfbeacd96c1f21874c3658d3ed9f_JaffaCakes118.html
-
Size
23KB
-
MD5
7567cfbeacd96c1f21874c3658d3ed9f
-
SHA1
fb7cb704137050f7e1b0d36e5a7c121ada5a815c
-
SHA256
0c4cac15d7acb2c82f70d1bf815f3afd4987d10a0121d33a73d74ec8baa9f26b
-
SHA512
a7aa18240aa12518401bb5d2612889a15bc40cade7e02d0f3b71fa876de3c935278718c9926690210f759baf9a4c6349560d9d2d7d4d6e56299d4c74c3f0f358
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIY4gzUnjBhM282qDB8:SIMd0I5nvHxsvM1xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3076 msedge.exe 3076 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe 1724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe 3076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4792 3076 msedge.exe 85 PID 3076 wrote to memory of 4792 3076 msedge.exe 85 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 1328 3076 msedge.exe 86 PID 3076 wrote to memory of 3736 3076 msedge.exe 87 PID 3076 wrote to memory of 3736 3076 msedge.exe 87 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88 PID 3076 wrote to memory of 4740 3076 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7567cfbeacd96c1f21874c3658d3ed9f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd329346f8,0x7ffd32934708,0x7ffd329347182⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9760267984771451890,11546865142266899306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,9760267984771451890,11546865142266899306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,9760267984771451890,11546865142266899306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9760267984771451890,11546865142266899306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9760267984771451890,11546865142266899306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9760267984771451890,11546865142266899306,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
6KB
MD5228d226d5d96b0a261a547f286d12736
SHA165f51505918fad7cb159423f8fcb4ba6c3ae3055
SHA25605250adcfbef841af007a4700dea8b2d807d2f5bf22487584a8a0d1435cac462
SHA5126ff4e2a423820737d516c5a0696452b9caeeb7c6f5d740a60fe8d6827a374225b00c0f3cbca48df5bacf673a6008ac0112227586fffb371c4b14e27e51a4ab2d
-
Filesize
6KB
MD5671bb1df4e99f44b9b8d6a620dfe348e
SHA129282fa1b49519b3326fab0ba286fcf624678646
SHA2563a6f92a3256ac68d40657bfa6da6e1439763d9ecfb23088aed52a9b82e406177
SHA5124b38f97db5136b1b27e1d1e3f9ff5e6fa6b0a170804399196d323784bd7037da22ba69ecc183e7e04f5938ce147543ec671f7068f027081613f815436a3e3f2c
-
Filesize
5KB
MD58b5ff752cdf0ecdcde4c2ef83ce1e90e
SHA1a4f58f8c2cf7bce4efbd0c1914b8562c66c5b5d1
SHA256995a5bb6240a23c537f2c5fce3e633e86c8d9128340b06ba9c5330f8d93d3c9b
SHA512aaabb00bcbbf38841d9e12e12a88f65e01be6f97a8bf2cdd525a5b3e2c642225ae2e59358534948c4866bdd6a8c54d02024526f38d34911520a9f8f1c20d8d70
-
Filesize
11KB
MD5f0d999d82bb6d58484dbe31b2595c800
SHA1bb27528f52fb7750a07aee7f3464cac1bfe9bc35
SHA256b2971bdb15f90980b6a7db036581a0b8b3d0d270bf38ee58e39b2a7bf22485fb
SHA5126020f39b23d525363fbf2cc8eb259af857e663c9229636a9dea63f8ca2cf1c07af0b284fd6a20b7bbdc49daf1e276a8ad0d085b5089c922f87fa8d2b0a537fec