Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
a36c16f9c5dd86b4ec7c20e15c39c46c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a36c16f9c5dd86b4ec7c20e15c39c46c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a36c16f9c5dd86b4ec7c20e15c39c46c_JaffaCakes118.html
-
Size
125KB
-
MD5
a36c16f9c5dd86b4ec7c20e15c39c46c
-
SHA1
8684278ed7eff547adde51cb7f7c671bb76eadc9
-
SHA256
8e90725d9113336e23602c796ece027dadcadf68dd7d60c7f3f20536734cca47
-
SHA512
6c3316f5e41504761d6d94a73b06a72ce70c9f5df3c0bd64b0290d87e1cac422582cb845c91284b2812037ea43c4ad1ea33e3e1627d4da4d52fe3681d1e46aec
-
SSDEEP
1536:V02PzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:V9zyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 2396 msedge.exe 2396 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2628 2396 msedge.exe 81 PID 2396 wrote to memory of 2628 2396 msedge.exe 81 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 3792 2396 msedge.exe 82 PID 2396 wrote to memory of 2956 2396 msedge.exe 83 PID 2396 wrote to memory of 2956 2396 msedge.exe 83 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84 PID 2396 wrote to memory of 1968 2396 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a36c16f9c5dd86b4ec7c20e15c39c46c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd66c246f8,0x7ffd66c24708,0x7ffd66c247182⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10905691624358123904,1872672825979174678,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10905691624358123904,1872672825979174678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10905691624358123904,1872672825979174678,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10905691624358123904,1872672825979174678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10905691624358123904,1872672825979174678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10905691624358123904,1872672825979174678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10905691624358123904,1872672825979174678,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
6KB
MD5b0201e012238cf0b66461e8d6a8eb49a
SHA195fc166f3333f2c2d25cf8ba440d73b840ac0e6c
SHA256f3c884f7bb6dfcc36e4d886210f52daba50e10c25ae670c3631c2f6ce0a78ff6
SHA5120621fb4fc1fd23bb76a7078a8c1d0d1935872d360a8ec287345ce69b802dfa9df642b988c35c5bbe1429f03d99e945c0e783e634f9ec67a852f0cdc90857ba7a
-
Filesize
6KB
MD56fa4dc772036f45a8a3bbffa678f18bf
SHA151bb0684e852de4a341985b57e503e38991bbe55
SHA256169e8b534003be3d34b00196ddf94309e33140f88fe7a008199bec62eedccd6f
SHA5129f6f95082657e1cc64752a0ca14135c51a6a9d22ef165de7ec8a899d6e38c209c0b648a645aacd97c4e26303dd7a5273772a594f9fd1643bb63969aa8ebd2497
-
Filesize
11KB
MD5d6b513ccb0bb9dd2442d061a1c11a909
SHA10524f926f26cb4608ae3db4cc0df0c1e3b3db154
SHA25687f5936b94175010581be583f95c4ee14eae2edda14776bfd81d5ea333163fc8
SHA512298ad8214791865041beea24cd4fc9e03092adf6a19e08f8628d5c5847a3960f64b200a319ba9ecb7d164ac35fbafdf83ae6675a8a52494df4f6f0b8d42bb582