Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
7f49f57bddc227dc42b900e94bef00e4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7f49f57bddc227dc42b900e94bef00e4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7f49f57bddc227dc42b900e94bef00e4_JaffaCakes118.html
-
Size
214KB
-
MD5
7f49f57bddc227dc42b900e94bef00e4
-
SHA1
9024e6bbc5edc5a5b726bbb7db19ae23faf881bb
-
SHA256
e6dc80c4f909a5157e9fc951e30d5cad90045e916b28b6e3ba7b3d1130c6e1f6
-
SHA512
0b03cff558848c21ead74e5c280c92f592e77860b7bee1af4cd336b7f570e02a13eedd1cafc4c8c4f3da5c227cb3ecf31f013d621ba74f299b535d8fdffc5324
-
SSDEEP
3072:SYrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJa:SAz9VxLY7iAVLTBQJla
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 4888 msedge.exe 4888 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 3212 4888 msedge.exe 82 PID 4888 wrote to memory of 3212 4888 msedge.exe 82 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 4884 4888 msedge.exe 83 PID 4888 wrote to memory of 1696 4888 msedge.exe 84 PID 4888 wrote to memory of 1696 4888 msedge.exe 84 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85 PID 4888 wrote to memory of 3836 4888 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7f49f57bddc227dc42b900e94bef00e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd092d46f8,0x7ffd092d4708,0x7ffd092d47182⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9068877186742959494,2785443342188496687,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,9068877186742959494,2785443342188496687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,9068877186742959494,2785443342188496687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9068877186742959494,2785443342188496687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9068877186742959494,2785443342188496687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9068877186742959494,2785443342188496687,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD5f7a5b7973665e11132b07e3e5fbdd09b
SHA15b16670f1c4f5d5130a8cdd9b688450a9c071415
SHA256b73b745d953b4ef61492603c5e54afc1800514aeec265ba8696f0919b38c38ae
SHA512aee0523b77690cb356ec26a544ef390c18c01066036b5e9910a64f7b3d12deac36969883a31816ec1584284352008d2fea45b4219a17554efc8f159005fb4c95
-
Filesize
5KB
MD5348da214ad2230c8266aed14531696eb
SHA1c5915d026313b26db9454011b38b90c28065b4c1
SHA256ca269b106b108f3768108ce572ff681d08689aeac32bd111af23ebc52340d1a3
SHA51279dd5927a7bd977bbd6aab272a85f8162a6097596b35b0305c50b92660c46fdfbb6427f8ee4757ee939e132aa1f1afc6ef334c350acaa20c0fc4eb165b503973
-
Filesize
6KB
MD589ee67d62f23c5ac9070dac28aa4f4db
SHA1f54aee4fe64c675c19c9d0cbfbd3585003dc7fc5
SHA25609cdc71f64da8157518526af2e89b974dc1df6fe0ae1041d6fdd530981470dd1
SHA512d82a2a6e840920fb4c292dcc277043c7370dfe0e79f4ef68dcb3fe668c50f5a27682440acd7bf7cfd8605f4a82d3ff1feec95af1dbba3ecf916955ac46a2084a
-
Filesize
11KB
MD55047bedbcfa4104bedfa9d857c347154
SHA1e55b050a95e557309a6fb3d48537e34b30de7a1f
SHA256a8ae8f1b9517985690ffa054acd5ba586cb9fc1e5716cf36a2bf8a58d33e02ab
SHA512368414aa0abf41c0e00ff9b9e5017bd67e646360fccdcc69f2e43d7c0872ca0476c98af116ea4f3458384705c8bbce3f1fe558009e1594b68cb3dca103e4c38c