Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
b397f0c0aaba23ad18331450b854df6a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b397f0c0aaba23ad18331450b854df6a_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b397f0c0aaba23ad18331450b854df6a_JaffaCakes118.html
-
Size
207KB
-
MD5
b397f0c0aaba23ad18331450b854df6a
-
SHA1
b2d857e037b5f6d8ebde7e6ad43334c80687330f
-
SHA256
278048eb3a90ae77a217cf6a3c9399e3f6bde6d9ba49ef1a2ebfa5cb0240546c
-
SHA512
873811e12aedfc67ec9ba1975b8cb04ca3de5e3778ae3cec0d8081a4bb0d7329e7a7eea5a0a3b60cd429a50cef6439ee8de20a113a63b4fdddb448cdf9ae42b6
-
SSDEEP
6144:K530DH6NEQwjcHXxQRVufJc/09X1kUA5s:KuDHQmjcxQRVufJc/Rs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 264 msedge.exe 264 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe 2572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 264 wrote to memory of 3480 264 msedge.exe 82 PID 264 wrote to memory of 3480 264 msedge.exe 82 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 2984 264 msedge.exe 83 PID 264 wrote to memory of 1724 264 msedge.exe 84 PID 264 wrote to memory of 1724 264 msedge.exe 84 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85 PID 264 wrote to memory of 1060 264 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b397f0c0aaba23ad18331450b854df6a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb2a3546f8,0x7ffb2a354708,0x7ffb2a3547182⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17168916707133324606,6082079624220515015,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17168916707133324606,6082079624220515015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,17168916707133324606,6082079624220515015,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17168916707133324606,6082079624220515015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17168916707133324606,6082079624220515015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17168916707133324606,6082079624220515015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17168916707133324606,6082079624220515015,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
2KB
MD5b27a7067695b20eb9a8c23397f60489d
SHA1e252c75903a6a3444fc1b60ea04d7ee9061881a5
SHA2565de7db77ba3ee5d43c7ae0238380951e5057fdd4f4ed0570057f4f4006ca6d25
SHA512542f1cb4e6f36b780b832340cfdfc735eccfa60eb1dcd0b606f279f4891671f73a69abe9682634309027e2354dcefc99ffa4a170e2c88cf7838a7b1de0735903
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5c304aa5c69646da1df1bedd35f8a6985
SHA1111fd5c50fcb671a403d06dac74de52ee544c757
SHA2560919ea2db1eef3e4fe241060ae2873bda8d67f7b4dab253e99fdde63ceb63ca1
SHA512787b64e68cb3b2b45100f616bc71eea6b6b2e841c14dcdaa2e650d377232a40f33827446ec21fc5cabbc006c0c06de1ec43b2330ffa40bf4c4e41944bb033ab6
-
Filesize
6KB
MD5e2c393a0c7528e820fa3d2525e98e9e6
SHA1ea9e4f695c48033400561e4faa83fc5b64a0c968
SHA2560e26a5d121e6abcd7e72436d972014051a4c671f73456fa223c4d06e70cbad95
SHA512d0c33739c72bca73f108a37a820709fec30c6e35f5f3bcffc0999b50ce0fa8bccc378d1f61f72f852f6e0736274fbd0411c8cee1c6a65356b9089c83993f3970
-
Filesize
7KB
MD5bfb80283f411737fea19ba5e51579cc3
SHA19360f7bf54c6d932dfc09378703249c2d465d4a2
SHA256c505ff62cd9c90e0603925408ae64c665669e72adbf7504df437131937ee026a
SHA512253ac0255fa85c8aeab034e6b7f1ac1b1af750227aed9b2370b9eb1eac1521e8acb39ddfd375b3aea3c08f4275e719ca5e639945eeaa09a47dd92bc85d08ec73
-
Filesize
1KB
MD595def7dbc327134fe11271960549a077
SHA18ead53da3ff44d74a721db3f0ee663cb2921e178
SHA256b1980247ffe92dd68a737cd82a49aecfbfd4e70344418b6566f625aa5ac261c7
SHA51270b978942653e269455b91896147a933fb3a454a88882ccd5290b6238f5cab16c3276f9165c3659da70c652fa19d0d91bcd84efcf5a6fe44dd203736f32bf897
-
Filesize
707B
MD5a56b062cd7549ca841f2d7c83444cb4a
SHA195a03fbb94b46b38f8710a613734fa10f769f00d
SHA256ee19476a09720cede19e1d7a26104e450d084a84de5f3128907f1e29724e77f5
SHA512b11b830b482430b378423d14a008d1387ae1b476daa0ea902ed1d91e8700a832c261aa93d6add824f018c8d8f2615b671ed091149790f7181b4ff963e14cadd9
-
Filesize
11KB
MD5ca9fd5c3da42e0642a0005fa7e56f828
SHA1ee13d73efb6e5c8c5f3d1ac51ee8c564a04fe570
SHA25661a82e1ad125abdcf254d3736ede20469850ea6a4f22eb4b4bd2093f521888f7
SHA512b50621fb952ad9c540e5fbc58dd7788cd62bf5276f43022c3bccdf3de5306b7736de1a9e3f81fb7c27317268345b7656b87484c81de7bf411a99ce0b5df5b6d9