Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
838878c1edd1a6450275d8a664835789_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
838878c1edd1a6450275d8a664835789_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
838878c1edd1a6450275d8a664835789_JaffaCakes118.html
-
Size
20KB
-
MD5
838878c1edd1a6450275d8a664835789
-
SHA1
8de273448031964811f7a83debe0c702f877ceb5
-
SHA256
c601995df5fa596ce3dfbc0a827990bf7931fbed094342c891fbc62df5803c57
-
SHA512
6ae09d87caeece563a61fb69f16500fbe5d4237ee05e4478bd844d6300f158233daaabe2b2e9f2fe82430e520845daa2a9f8a5c1f97bf5a4c08102486e8ade16
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAID4jzUnjBhpz82qDB8:SIMd0I5nvHJsvpoxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 712 msedge.exe 712 msedge.exe 1576 msedge.exe 1576 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1336 1576 msedge.exe 82 PID 1576 wrote to memory of 1336 1576 msedge.exe 82 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 4124 1576 msedge.exe 83 PID 1576 wrote to memory of 712 1576 msedge.exe 84 PID 1576 wrote to memory of 712 1576 msedge.exe 84 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85 PID 1576 wrote to memory of 2328 1576 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\838878c1edd1a6450275d8a664835789_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb533746f8,0x7ffb53374708,0x7ffb533747182⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,4390652699630617441,5214540338418293298,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,4390652699630617441,5214540338418293298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,4390652699630617441,5214540338418293298,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4390652699630617441,5214540338418293298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,4390652699630617441,5214540338418293298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,4390652699630617441,5214540338418293298,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
5KB
MD55d65a87312473b50bab6d9184563e2ab
SHA13339e6e8686d63b96c131a52291896a152f8f477
SHA2564b7eaf19ccec004b9a922edeadf4695c4f4cd08797addf83a3f960de9bb2239f
SHA51201087c12c2c1b14d833090037d84d9328ba91d123d8dbbbf9d31744770e314cd08af3d30cdd48f30ec65b740edebcf10329bc0f01eca936ad4b6fe7976b51562
-
Filesize
6KB
MD532349bee3fa1e72394640f5aca7008c5
SHA17333c2dc49ecefe767bbc5e211c0018d6fa0a98d
SHA2563b5bca7b20bac873ff5155fec829357c5b05f890ab3a9987911559ec58595901
SHA512fcd17ae998737bf49df9394bd42ae1a79c9abba033d537032b8b0de89de77ad18a35acae516b9fa7c2532c96ee230e02992820b21d95f35cde94c94ec2215bd2
-
Filesize
6KB
MD50f2e443905f134dbc12711ab16af5926
SHA1398111582b957a4266345be4cce540751cb551ab
SHA2569351073c3bb6177141722cf7f8cfd47a22067f722012841329cc461361a2f17d
SHA5122f04283dde2a97ac958c76f83195b0683f8558916e602039c99387eaf1d7bfcf96015f1bded4483e20715c52abfa3e51d47b0bfc218c13109ba4c8b5ac1535eb
-
Filesize
11KB
MD59e1eff70a4865877452ca1c5cdc036d6
SHA175e116e7ec7617551f25f7c3e688df599a732de3
SHA25672ad7d58042139a6997197b39b7377c4cb9eec54e31404de4f8c16ae8a2d18e3
SHA51293638ff318c92552fa433afc4fb577f9f36b4db7c96a747f688b46c1936a49b5b57e96dcb156a5d98460701748133d105d698e2c103991f3aa4d083f4b716631