Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
7d892af815a154333a710754ae6f33e9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7d892af815a154333a710754ae6f33e9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7d892af815a154333a710754ae6f33e9_JaffaCakes118.html
-
Size
139KB
-
MD5
7d892af815a154333a710754ae6f33e9
-
SHA1
7a79c0188fcf836d9f7e8e2f00d73291657bd99c
-
SHA256
e5dd4556e84255ab6ced665d6974f0f1d1353edec7a8b48d0179f87b34772b2a
-
SHA512
4651347de0ddc611a850b182858220a9a4658456a3eb7dddf68e3bf1495392ae3d599e801f99b75cbe09658badb83ad0582fdf7ccc06b5ee21569d748f315677
-
SSDEEP
1536:Sunw8lOGyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:SuzyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 3512 msedge.exe 3512 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 4016 3512 msedge.exe 82 PID 3512 wrote to memory of 4016 3512 msedge.exe 82 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 1320 3512 msedge.exe 83 PID 3512 wrote to memory of 4312 3512 msedge.exe 84 PID 3512 wrote to memory of 4312 3512 msedge.exe 84 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85 PID 3512 wrote to memory of 976 3512 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7d892af815a154333a710754ae6f33e9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda88e46f8,0x7ffda88e4708,0x7ffda88e47182⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7081414804844249957,3584366771389852284,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,7081414804844249957,3584366771389852284,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,7081414804844249957,3584366771389852284,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7081414804844249957,3584366771389852284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,7081414804844249957,3584366771389852284,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7081414804844249957,3584366771389852284,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
5KB
MD5874c4f7c3183d945351d2406a8eeee21
SHA1308140b1a9bf54c59d02346106e560493aacfbd5
SHA256c21dcc91ae8c0f9efcfea2da16180f8da2a886d8f616ac8f1eb76a8dc7fc9d30
SHA512fdd506c43539e0702ac00f7be6ce9ef8ccef24b6009f0d86ff0fa4beea69cb942ffd51d38cafbff37e4a1199d46ad1907689e36df4950d5e676754b7e0ca8c21
-
Filesize
6KB
MD5865050932f23c06aca2dc72f77c4edc2
SHA191e2e3f8b574137658ead9da4c217c3d6c00a48f
SHA256e6c39d4eadba960df72c7ad6ab44668da17ff25be7717709308687e6d66e3e3e
SHA5120172b6af3b4ef1ae294d1cfda932d2e2296a6aaf2a6037b5b0932f4b51c5883b91d7e3e3d21035da6990a1b5df473e8c4e73458ee956efca4d4ee37adedbc53f
-
Filesize
10KB
MD53bde8569d0b3e2577fc1d6d24035bf95
SHA1664ef916f31e4e3515f91dac69e4083b4ed768bb
SHA25600ce785f4d2f8c4054faec503cef1390549d12b78618e11d4249085cfd740f93
SHA512166151fb73e689340cc5c0c2d6bdc3fc36d5fa3de2fd778477179ef071cb8d22bff0453405a394d65e2bbfa3aae76f4f7285041ceb3249c4360746e8f68d72cc