Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
ad3ed63c7c4c789999d22b3c53cf3ce8_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ad3ed63c7c4c789999d22b3c53cf3ce8_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ad3ed63c7c4c789999d22b3c53cf3ce8_JaffaCakes118.html
-
Size
139KB
-
MD5
ad3ed63c7c4c789999d22b3c53cf3ce8
-
SHA1
01b08620c169f080f356ccc3d1479f83789b715a
-
SHA256
4fca96f5cf1a44619410ce3d9e136f4b642dd070f381c2d3921942b4ae9afe62
-
SHA512
b70e1ce21d051e41ba9d6c22ce9102c179e7d5372194e729d6644ca0e0eae768b157700d139f7139bc82f1d95eb14b587ca743d2b8704cf7c3568eca9fa2c439
-
SSDEEP
1536:SpdQ1CGiQklzMxyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SpSDdXxyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4084 msedge.exe 4084 msedge.exe 4372 msedge.exe 4372 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4372 wrote to memory of 940 4372 msedge.exe 81 PID 4372 wrote to memory of 940 4372 msedge.exe 81 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4996 4372 msedge.exe 82 PID 4372 wrote to memory of 4084 4372 msedge.exe 83 PID 4372 wrote to memory of 4084 4372 msedge.exe 83 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84 PID 4372 wrote to memory of 2432 4372 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ad3ed63c7c4c789999d22b3c53cf3ce8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80afd46f8,0x7ff80afd4708,0x7ff80afd47182⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10395144819256732008,13178450906173223181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,10395144819256732008,13178450906173223181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,10395144819256732008,13178450906173223181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10395144819256732008,13178450906173223181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10395144819256732008,13178450906173223181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10395144819256732008,13178450906173223181,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
6KB
MD50a6198d2114d6f39ebb990a19c9e0f72
SHA1fa0e0acadab80471ce9a23a5ce5f65acd7d45b58
SHA256c2cee33242e7190f3e4024cf6610e10a31db78aeb3301331ef5272a6ec9c1992
SHA51207e48815a126c623498a4cc000cb19353b3c11f03db94c1692dda816f29edd97c81a485710b88c40317d7c91c551069f94e75ce3a73d2c8234a57bd33f1641cc
-
Filesize
6KB
MD5d3731bfa85b977661686546155f6e662
SHA17552e26f3ac1122b0541fad553451628e709f698
SHA256017091d6c025c42011e70c38aa06e083cf4f8e026cba96856abf09e9f8f39d2e
SHA5121a6ce87e9e7dcb271f445961aaacc1666c2c9b0d1f4d593165326514ba39d2794c7fa3fdbdafbabf97a3cce77b5728f0f084184f0e6f11abefa0581a3e26e1ea
-
Filesize
11KB
MD58fbc53566b521e41bb83433757558d3b
SHA14206b576017b061aefbd7de865b08f32de23c203
SHA2565adea42cdb5f4829bfe63b7f21f1c5d4526800c596cb9d322e76709cae1a8e47
SHA5123240020222dc95fd8925bbde6f8f98dbb27509493a7c4680ab028bb285f79797ddbcc824f1b4651f2479af02adb9bce1108366f6e4f27096cf6fa07d79be6bd2