Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
97ceb8ea24ca116a878b48ed3b816298_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
97ceb8ea24ca116a878b48ed3b816298_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
97ceb8ea24ca116a878b48ed3b816298_JaffaCakes118.html
-
Size
213KB
-
MD5
97ceb8ea24ca116a878b48ed3b816298
-
SHA1
61ff1edd8e2d0767d91a3ca05c65d5ceb24227db
-
SHA256
430d7aa0b81b22d733d9d921de17995023ee73ddcf585c3f588008671d2a4cfe
-
SHA512
0ca045f2fc5621dadef8e4e3acf407106caa2cceb4e8a99ef1998d1832699cd1e3944952935801f96a86f578e9bcca12e31db82171c62300815d221e5ef88fde
-
SSDEEP
3072:SzpFftnoydT7wyfkMY+BES09JXAnyrZalI+YQ:SzmQtsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 3420 msedge.exe 3420 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3420 wrote to memory of 3264 3420 msedge.exe 83 PID 3420 wrote to memory of 3264 3420 msedge.exe 83 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 892 3420 msedge.exe 84 PID 3420 wrote to memory of 1312 3420 msedge.exe 85 PID 3420 wrote to memory of 1312 3420 msedge.exe 85 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86 PID 3420 wrote to memory of 936 3420 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\97ceb8ea24ca116a878b48ed3b816298_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff810c046f8,0x7ff810c04708,0x7ff810c047182⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5828943581483549135,4738230396105210212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,5828943581483549135,4738230396105210212,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,5828943581483549135,4738230396105210212,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5828943581483549135,4738230396105210212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5828943581483549135,4738230396105210212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5828943581483549135,4738230396105210212,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD570d2fcb8d8494b70c551161c8873c70e
SHA10769c7cb633c15323f003b29e466baa831afde9b
SHA25695bfe04579b4b3b8589aa55168981a29f07ddd46097d943dcb5882d399c8a2f3
SHA512758818d8e9af8fc2880e6998e4d58c20059e71e9952f25690d4548d1c7b630391c8d5139e98ebbbce4cfac76296a4e7c1d2e03973231d3bc94b020296c6394d6
-
Filesize
6KB
MD5f10e751da7be436c49b8a78a5c651d48
SHA10af6a16497e2643166a85e6a917ccf4509d73ae0
SHA256c5b18f4178bf7e6e6777d47b8b06f3d131af41a98b6ef472a662fd68435d2c43
SHA512ed3d3e25f4ea50f8572b293eff10ae6b66e676c3fa23cf47cc6f3b09434eabb24a3a379c16737be6cdda3c2b7ea836837a908f069fea86e0e1a1152cdea9390a
-
Filesize
11KB
MD553b04d244f75e082e73a4d690f5980fe
SHA1bb516ad7150b31a814214077d1a66134dbcf0c1b
SHA25679f7b08b03c24b383214af62e0cc5ab6c6b591ba3ffee85a0b03d83aebbf9e99
SHA5123970bfef8d4b2ad1ce3baecfb772cfce9facbb6395daae14882d88ac327b0965a515649592dd9461781b291f2b8ac9ab5f644f54df34784c442c4b733571d7c8