Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
a2cb072de01eecf88649e6cc871e868f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a2cb072de01eecf88649e6cc871e868f_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a2cb072de01eecf88649e6cc871e868f_JaffaCakes118.html
-
Size
217KB
-
MD5
a2cb072de01eecf88649e6cc871e868f
-
SHA1
2a8d987782c34c769e4acd322fbf0c31ecc4e78f
-
SHA256
114ac2af1c24113c485b82e9cf254d4bb1a5f53de1663b73e16fa46d5baee973
-
SHA512
088201e082576640f59554e7195c022fcf11cd1de6908e28251fb43898acab6292525a12ce9466e6ae3621c98c7a03a60f78a97b320926d0e043b5e97b3a19e2
-
SSDEEP
3072:SUMUzbw758rtgOLPzyfkMY+BES09JXAnyrZalI+YQ:SUMobu58rT+sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 4748 msedge.exe 4748 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1064 4748 msedge.exe 81 PID 4748 wrote to memory of 1064 4748 msedge.exe 81 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 2884 4748 msedge.exe 82 PID 4748 wrote to memory of 3312 4748 msedge.exe 83 PID 4748 wrote to memory of 3312 4748 msedge.exe 83 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84 PID 4748 wrote to memory of 2428 4748 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a2cb072de01eecf88649e6cc871e868f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7b6d46f8,0x7ffd7b6d4708,0x7ffd7b6d47182⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15673854338230603372,10293942138505092481,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15673854338230603372,10293942138505092481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,15673854338230603372,10293942138505092481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2616 /prefetch:82⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15673854338230603372,10293942138505092481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15673854338230603372,10293942138505092481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15673854338230603372,10293942138505092481,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD54f817e908f50d503fe7796c4b2b5bfdf
SHA1cf5534d78bdac24e832105fe56fe23fef2be55e1
SHA256283b2570c8a12221090e7abbc7156e2d3a5be6530afab54c7c79596b515fb422
SHA51224ecd11c50ba7c7342deb8092e9c24dfb4a488606b1c1e9e1ec2cb4f3eb736614b5deb7e8ea993c02aabdd1a41fd39d1e69f6b73ed8e15a978d1dd3fd0b4a5e1
-
Filesize
6KB
MD52c7256bed66f003498509ff3d2959f94
SHA1bc38a0e594d5f87a5f88493c5e1ad2563967228b
SHA256e969f9b87540d750d07f4c3d1d74497ab07a0f307fc03c9f60cfb9ecc0986b09
SHA512b8f0d886c4cc0128a63f0cee4fbcd089c8678914cf2678de892d42ef3323c8b80aa89d44d2ae12c93ac2d6f27a487d9bba0290d1d5078bf8a39a1fa113bba415
-
Filesize
11KB
MD5912b85fb204c71108de454c829420740
SHA16fdf0da203c701b165dc057ab109b0f3247a5b33
SHA256ad84d6a6dc45e3742cc1cfbd0902ef1258f1bc79e5dbabf6d4410e109a0a7cc7
SHA5124f84c1c5f6a70e848d576eb810dbdc2f405ac9cab26fb2b36d67379ff7b448936db2b3ba951df58e83236ccbcdb32f5e244e122a0cf502e43f98e220304d69b2