Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
75919542e44c29064358cf1ef463e63e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75919542e44c29064358cf1ef463e63e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
75919542e44c29064358cf1ef463e63e_JaffaCakes118.html
-
Size
148KB
-
MD5
75919542e44c29064358cf1ef463e63e
-
SHA1
10b0c9b8d283c5f3ae589d4a564b827bb0d003ac
-
SHA256
0e5ffdec484a3d9e8b1fb2a8bfe97fd4bbb09fde90fb73f76f1cf4792c8eef4a
-
SHA512
1911a29505aec28ba162b2c27b9ff53ddab53407a7f8b50e3763d46d29c21009aa0e18063bf6b9abfb1c695ddd4b362f9b84798365fe560f76d70809bddb8b16
-
SSDEEP
3072:R2SLWZ/relVC2hNx5xWJdJX2SOg/i4gx/q4:R2SUpO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 4180 msedge.exe 4180 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 416 4180 msedge.exe 82 PID 4180 wrote to memory of 416 4180 msedge.exe 82 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2240 4180 msedge.exe 83 PID 4180 wrote to memory of 2624 4180 msedge.exe 84 PID 4180 wrote to memory of 2624 4180 msedge.exe 84 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85 PID 4180 wrote to memory of 3704 4180 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\75919542e44c29064358cf1ef463e63e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c04046f8,0x7ff8c0404708,0x7ff8c04047182⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17348149241946801812,7720286603713891647,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,17348149241946801812,7720286603713891647,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,17348149241946801812,7720286603713891647,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 /prefetch:82⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17348149241946801812,7720286603713891647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17348149241946801812,7720286603713891647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17348149241946801812,7720286603713891647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2212 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17348149241946801812,7720286603713891647,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
1KB
MD5d2d40ef2465cdefb1af0d7722c9c28fa
SHA1f935926393b8c2ec19a5cd8578640df2e459be0b
SHA256f67b0849f2c5c86f8ec19f1dc222defc0947a0ed8b88f1261851b0dca3d73047
SHA512a59ddc3d6a4f77c00d4593873baf7d2b238b22dde150de5d98a46653a315ef708463acf852dd6e5da7b821f7e27cb52ae1f8d0f96132afe45f67ccc8b34762e9
-
Filesize
1002B
MD57a2885a62af8c80eb15efe0d8bb6a60f
SHA1cfced65eeeb3be05ec92cda4c9cc1f76fd9ead4e
SHA25660a5d887ece5a9ed6854da60b2dca2c5c13319d52f44e0724049171b11af7cd8
SHA5128a0675ede13bce36bcf1386aaaf3828d743c5ff1f2c8e22fa245c52efedbd983aecf9f77d852a06767ad542c852d29ca4d9aed729673ad7eff9e9a50f4a7b594
-
Filesize
5KB
MD584a11eaee2d1b7f3fe5df742748499c1
SHA185eaf8c6138bd90285a5550a31ca5bd7585b447b
SHA25672b4c1a5a89b068d27a635aa5545d40d0ec6575f5867f29f6186b055b0d52ff5
SHA5123eb23cec2afc3858eb754f1ef70d95ea48c7790807343d644a030a5e528142b187481d0373d98b47b04dfa3f0a9b25457ad9bcb2aea42cee4d5e3a195f15b947
-
Filesize
6KB
MD5fd2a8f21f037ebae4ec5e5a09c81ad93
SHA1004c9ece34f5177d2cc46aa2e8560270bb329bb2
SHA25659a3c89c3d2f236afadc8f0fda4741b8f0e4ee1c46e964857bf1126b021a2e71
SHA5129da4eb9d08ac5161ef55d81f580757b759dce694cb440884ab906ad377d9a035597a887f12f032eac20929d227f6418e7aef3307dd934ef8d4fc6d682d45e4f6
-
Filesize
11KB
MD55c8b19278f6c8bb7218012f1b4948fb1
SHA1527deeb3263218f0e90a780f57409736ee436239
SHA2567eadd910d0fe1fb8a2cd3e005d7b89c296295c8c102f37b7cdfc8889e4c792c7
SHA5120765a869ad0e72185f439bd46d1ad1e3f83b16e1a480355a01e0241b7d11583e324e4fbf8d6f7d16136bfe012aabd660ee0bc0c635a2633437dc709565dba575