Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
9a7831987442d3304e5956ebb3c644fc_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9a7831987442d3304e5956ebb3c644fc_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a7831987442d3304e5956ebb3c644fc_JaffaCakes118.html
-
Size
18KB
-
MD5
9a7831987442d3304e5956ebb3c644fc
-
SHA1
a6c79a2b81ecbf8f3428be85b806276727f54df9
-
SHA256
aabee8a3adac4b232d75ed80bc8745a979dd0409ecc30efeadadcce12597d59c
-
SHA512
116a1e484d2d892ea9e87a00ce16e7a3e710b23b8cb4327686047b08f2826a42c228f0bb4d072665581375ddbefc050dea079af877dce189ac6897b1c7bef2ea
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAk94lzUnjBhHJ82qDB8:SIMd0I5nvHjsvHixDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 2764 msedge.exe 2764 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 4144 2764 msedge.exe 80 PID 2764 wrote to memory of 4144 2764 msedge.exe 80 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 944 2764 msedge.exe 81 PID 2764 wrote to memory of 4836 2764 msedge.exe 82 PID 2764 wrote to memory of 4836 2764 msedge.exe 82 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83 PID 2764 wrote to memory of 1596 2764 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a7831987442d3304e5956ebb3c644fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f56546f8,0x7ff8f5654708,0x7ff8f56547182⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5664519661067680793,16929917979953631019,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5664519661067680793,16929917979953631019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,5664519661067680793,16929917979953631019,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5664519661067680793,16929917979953631019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5664519661067680793,16929917979953631019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5664519661067680793,16929917979953631019,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\438330b2-744d-475b-97fd-6bf50d881707.tmp
Filesize6KB
MD541b74c9f055cdd0f250ffa59ddcb02c6
SHA1817a8548e8ad2135f5afeb045a1cc062914a6074
SHA256e1df07959d7913f1e34ca00ba2369abb8ab877f548a3b0078dbe879a2921c559
SHA512e3d50b23f569604640641fbb4807fe9a122901b52df30f37f4dd80e4d70b837c2980f6f1f180f3ceaef5b45d16aee1f618d87b1601b653d75347f783bded9dfe
-
Filesize
5KB
MD5e12df67e244087a2452b06e63d7d60f7
SHA1ae1fe445bef9f5f2aaeac49656ac3ce6c1190f15
SHA2561c4f1ac8529e1b1e9c7cc112012e148bf8b205d6517ec46185a590afb3a9f2e7
SHA51208c8b73d60099b5b2d57ce4a312f182020c90ee1ebfcd68f7019e1dfdf1aa4ca4abfa76bb9dc206cd385d11e27ed4c5662ee776ceaf4169031b7313b852ff402
-
Filesize
6KB
MD5fbfa2b4bf056816001a278f8dfd296b2
SHA1b13db124b78bcf9344de9fb9bab5f793747b9c4a
SHA2566f6ac07e369c8ab818f1ff055054858e2c3ed016f3fc2999b14f8df1e5f178d7
SHA512c8df62e1234eb653a1199f69c2fc54b12b95ad56067f8b3ef593353e1056f69bd68f9cd70774c8500e3a9245cd957cba825c2f9b7be55ea57371ab2cd711777e
-
Filesize
10KB
MD5aed9bc767096d17dd3c7f3291099afb0
SHA1db51543173c8a61c1830dc434b8ac402768f82cb
SHA256ee6f2b8e169b13182a5a11da68b20dd1b959cd5bfb2f57c52cbe25f882bbc932
SHA512406337a3aafd4f13d5d422dfd8ff0f33b291b7079190ba951a0c3395b6ffe825b56280e16102826e4a5fa7df848d0028a0441d4937de23bbac67a0f78381eaf7