Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 17:28
Static task
static1
Behavioral task
behavioral1
Sample
a1818e7b3b0fad078bb3e4bdbab4f96c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a1818e7b3b0fad078bb3e4bdbab4f96c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a1818e7b3b0fad078bb3e4bdbab4f96c_JaffaCakes118.html
-
Size
139KB
-
MD5
a1818e7b3b0fad078bb3e4bdbab4f96c
-
SHA1
cb1873bfb77c07aba7dc88967a29c0e96c168f96
-
SHA256
f19bb0222bf360f226221ae1633218af1b291db9d07fd559f2a38d5c864a0079
-
SHA512
0292b0ecb0e925e95c406bf3cc500539f5e83b556727614b71d2315bc444662861d8f33c7eb18c17322665bf4e423c2e12d924586cc79e5a613d7dc7f4d2833d
-
SSDEEP
1536:S1Lgl1n3lSxyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:S1Y14yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 5072 msedge.exe 5072 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4924 5072 msedge.exe 80 PID 5072 wrote to memory of 4924 5072 msedge.exe 80 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 3340 5072 msedge.exe 82 PID 5072 wrote to memory of 1832 5072 msedge.exe 83 PID 5072 wrote to memory of 1832 5072 msedge.exe 83 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84 PID 5072 wrote to memory of 2244 5072 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a1818e7b3b0fad078bb3e4bdbab4f96c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffb927846f8,0x7ffb92784708,0x7ffb927847182⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,7622414254489344644,3544419659822454095,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,7622414254489344644,3544419659822454095,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,7622414254489344644,3544419659822454095,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,7622414254489344644,3544419659822454095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,7622414254489344644,3544419659822454095,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,7622414254489344644,3544419659822454095,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
6KB
MD59c249d6c0202999cd49c4c8edf6be23d
SHA146c806312fb521551cf300bd34fafbab78ca5d8a
SHA256d24152bd7da70dd620d2f570488ab094a9b623835bf6b3652eb4214b20441ef5
SHA5123defa2195c196544c72dc89245f8e158191d25e797ab5b138dff650e08ec1ff6698488b8f5d48ae39481a449823e6ff4743653ec1c70f4ca4224e856376e4546
-
Filesize
6KB
MD5c4ed8612d1abb75fb52693918db29390
SHA11a24303a0919d069e318d36431905e1017665b2d
SHA2564ccb16606bc93948576c30cefcf6590ea189a1319815377529b928fccf108e82
SHA512e15c207bf3cc1b7f382e6d4a422704f1abc81ad79ac9592686e73b6663e4b505c7dbdc594e46616b479cdedd581544daa46eee4f9dfd81faed957d0b27a82b2a
-
Filesize
11KB
MD5efe65f92349fd8c056962cd1f2b2a056
SHA173945c9eada1eb047226d8b6c9c7714e1aa42429
SHA256902dce6c9fe7623d8860ad473ad0e63da8f3f178f178807813c88c61e7b7a2cf
SHA512a577154ec8b1e28443d24410a0b59814be444c564c236a749450d826c9ae48ffa4e51ce3bdb0d3f8044648da8ec84a70e939698987eb4cc6b044b02bf937c299