Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 10:37
Static task
static1
Behavioral task
behavioral1
Sample
9de4f81d7d900a33a580cf48e4da0d8d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9de4f81d7d900a33a580cf48e4da0d8d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9de4f81d7d900a33a580cf48e4da0d8d_JaffaCakes118.html
-
Size
109KB
-
MD5
9de4f81d7d900a33a580cf48e4da0d8d
-
SHA1
28905a73c752cf8a09c3a6dbf5570be9ce0fb497
-
SHA256
f70574e6fac97b86784c3752a2623212e3227427bc8f58bb41b7e7019a52955f
-
SHA512
4d21a97ba2648023e2e256d06bf81dea1c01052539604eb8d86593d5e70c2577fb0bb3fc4e7bd8a38d3ca0e0d882838bc15ed54008ea580bd8c6eb01e9ff385d
-
SSDEEP
3072:li22sYJ6rHfgaToXdYK9Gf1Z4QmK773Ft7g/ODtl5cI7ZAKPPi:ltoaToAQqw/ODf5la
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 2980 msedge.exe 2980 msedge.exe 5260 msedge.exe 5260 msedge.exe 5260 msedge.exe 5260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3108 2980 msedge.exe 81 PID 2980 wrote to memory of 3108 2980 msedge.exe 81 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 4768 2980 msedge.exe 82 PID 2980 wrote to memory of 3692 2980 msedge.exe 83 PID 2980 wrote to memory of 3692 2980 msedge.exe 83 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84 PID 2980 wrote to memory of 3172 2980 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9de4f81d7d900a33a580cf48e4da0d8d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf32f46f8,0x7ffbf32f4708,0x7ffbf32f47182⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12635706057891310168,6550003194712176472,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12635706057891310168,6550003194712176472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12635706057891310168,6550003194712176472,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12635706057891310168,6550003194712176472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12635706057891310168,6550003194712176472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12635706057891310168,6550003194712176472,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
703B
MD55e864bd2a9522e75727005eceb60c19a
SHA15373c02cc4cd098531f73af51239e4bc4201e039
SHA256dc2f115a067e822c9ba174dfd30f8a55f0c6b7f303f874b3d94a119b1bb41cae
SHA5125274b622be313c8020f1650fb6978579f49dc6510ac143a52c58f595100a7e52e7b8be98e56f5368b99d561752254bff131f352ae7997941aba7068dabd7a833
-
Filesize
6KB
MD53567e74a1972019bd1d1452010b4a17d
SHA1be0c0cdd49a9af47aeda3278dfbf57fdf7a1dc64
SHA2565d78b98c3ffaae9aeea785f5bbef52720f71721bf797733d8f58c8ec5383057b
SHA51266efd4f07eb41cc2acea5dfd7d7ab21d4fc446f1a24b070c4a0c7afedc742c33a07bbf3756dbaad1ad71d1f0e37925d156749b0fb1033dabd9fb701d75166bb3
-
Filesize
5KB
MD5379d157d9e571b7d38a6f6d430732cdd
SHA1f1dedcae63f058b8d0a7db22c68ce2053f6943c1
SHA256dce49880e0ded58ff1ade82b8d838baa205487418e57dd889506f7908a5cc3d1
SHA512b9e7c24091aac005cf3995e4b4e4e76916824ab21414addeaab58240b9a026f9687f76b20badbb380e1fa4cab869a1db6f771c51140466c3415a7ff00d80dfb7
-
Filesize
10KB
MD5e423317fbb08639e7e6b1a7d09d660bc
SHA198f645552323415843c1ca6be9ee4a47ecc96281
SHA256adf903e39e8c037a59cf13dd4153e4be19b4926e6172f0969f8f4f89cf159d82
SHA5121fe295af58ef7825a05fc9e9a699d2d8b3aa017d73063b51ed557e821de5a6ef38cdb17bf24dd6674786f9c58895b12e39af8c5739370dfcb81c2c84ea555e1c