Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
19856a188f9067a6854e54849a3a6c7d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19856a188f9067a6854e54849a3a6c7d_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
19856a188f9067a6854e54849a3a6c7d_JaffaCakes118.html
-
Size
119KB
-
MD5
19856a188f9067a6854e54849a3a6c7d
-
SHA1
16f49474a9885f942fbe18bfdb9eb41ffa3a6089
-
SHA256
4f1a7e9034148720629d83230d924347fe2641aefe4590b7709e8f0588529b47
-
SHA512
a3709f43373c8d14e8710ec288097f44b9fc90e4614ae357762cdf605b216ba1a874694dd3d58a56e31dd483caf12cda905cc6136a8d32ba10236a09e3e006eb
-
SSDEEP
768:hx2dZBeXbZvybFevyYyym95RBekW+4Tvy5Bz1SUtCdXNPBjnLzHCNJ1gQH:hkDYEFeaYgjekWxvCz1PyNpbLzHCr1gm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 3748 msedge.exe 3748 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe 1328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3748 wrote to memory of 668 3748 msedge.exe 82 PID 3748 wrote to memory of 668 3748 msedge.exe 82 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 3604 3748 msedge.exe 83 PID 3748 wrote to memory of 4580 3748 msedge.exe 84 PID 3748 wrote to memory of 4580 3748 msedge.exe 84 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85 PID 3748 wrote to memory of 4296 3748 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\19856a188f9067a6854e54849a3a6c7d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e90446f8,0x7ff8e9044708,0x7ff8e90447182⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3853821545737288342,7671067349961463282,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,3853821545737288342,7671067349961463282,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,3853821545737288342,7671067349961463282,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3853821545737288342,7671067349961463282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3853821545737288342,7671067349961463282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3853821545737288342,7671067349961463282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3853821545737288342,7671067349961463282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,3853821545737288342,7671067349961463282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,3853821545737288342,7671067349961463282,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
5KB
MD59dd6fe4d1f392f01e1a914c0a50bda28
SHA1c581686c116245aa59c045467f5ad47a914335ef
SHA256b51ace174ebb436b03f5e13dda32d888ce45d997231430847f5fb4dd6fa0faff
SHA5126fb484dae3cc828175f41e516a31b919bf369833399907e9f395a05cddb2dc6bd3aa9f841b570ceb3bb529470af874a647322c69f38c3a82d5ff749911f52de8
-
Filesize
6KB
MD5b78be137b7cbd065725341af2385cf02
SHA10694018577767160a9c6e71c230699f38aca920d
SHA25695b4e0e7e5b5cb0a5fa9e91031537ddfbc5802850b89000fd975388791cf96a9
SHA51299f57275673a1758ee9d46f2fbc1f876b36b9cc05ca0180ee28fa4aba0bc8b645143515b5d8f6881fae0026a45bd2420fe9080fea48aa38488a4cf6a7aed0651
-
Filesize
11KB
MD509f3e616091054be1cdb7f38c7152efe
SHA1e065c663fa41b4bfdbb1274105d408887483ba73
SHA256969fa4d807512e3f0e8c9eb7e8ab4fe8f929493790a0cc192b4cc5e5962e8e33
SHA5123ebfe892943175eb513fd93edba140616063f7c8018f1bf94d0a8879ef06747a820199f95d3f26dc27eafbd24c766910f70c6602c99f70e17d699fdc3c4b6cce