Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
3496025c8009d1b2e0f6efeb6546f7bd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3496025c8009d1b2e0f6efeb6546f7bd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3496025c8009d1b2e0f6efeb6546f7bd_JaffaCakes118.html
-
Size
11KB
-
MD5
3496025c8009d1b2e0f6efeb6546f7bd
-
SHA1
ff021f261722acec68ebea82101e5dc0869303d0
-
SHA256
4714507dc9631a91e7119a5606b9327eb07c0482a11d0aeed1acb718f42b8fa7
-
SHA512
d98a987612dfd2373aadf09d1ca89f6bfbff71d0e803007ab806b5fb7c3a893a967e579daf7bd56e955c51e7d1a420ed46d89f9f63504fce95d86f6618d490a9
-
SSDEEP
192:2ValIsr0r57M4Wxa/T8I+/w1wvqa11AuBuLbdU8d:salIcIQ4WxaX+/gg1AguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 4156 msedge.exe 4156 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe 636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4156 wrote to memory of 2940 4156 msedge.exe 82 PID 4156 wrote to memory of 2940 4156 msedge.exe 82 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 2344 4156 msedge.exe 84 PID 4156 wrote to memory of 3620 4156 msedge.exe 85 PID 4156 wrote to memory of 3620 4156 msedge.exe 85 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86 PID 4156 wrote to memory of 2888 4156 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3496025c8009d1b2e0f6efeb6546f7bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7d0b46f8,0x7ffa7d0b4708,0x7ffa7d0b47182⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16976016201697463877,4580900577961000410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,16976016201697463877,4580900577961000410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,16976016201697463877,4580900577961000410,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16976016201697463877,4580900577961000410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16976016201697463877,4580900577961000410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,16976016201697463877,4580900577961000410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,16976016201697463877,4580900577961000410,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD582d54f8ce2e677a03dcf4c655dd2cc0d
SHA1553055e8096238d41f047865530301f86ffe3ede
SHA25683739e2c460097a85491a09ed228626dea7817a44fae0062d354f9db08e120c6
SHA512a60aa5e0df374d809b283c6f1badd9041df765f6d4c81f53f82469fca4eebcafcb2c776cd1ae6742d4c60cf514f3bfda6e7205cf3e2f436933990800c1d19d96
-
Filesize
6KB
MD5ce758351781fd75fe6f3dd9e85d919bc
SHA1851e751fe5418fbc763fa9f5aadd47fe77380122
SHA25699f8cd17162a68594f88f0c0316942712fc17a943d483d73451e2af93a759760
SHA512d82e1db4318a546c5267390dd94abeee2487136c1d721ee1e0365a5b5eebd2af55ce840fbaeb64c5baeefd20e1c75214e3e83b09ff9fd2cb1b64e130427b1699
-
Filesize
11KB
MD5de9ca8890c95e9f191632af9eebb85ba
SHA1ad0c4c8549140ee959adfecf2b7254879236bd56
SHA256402c0444027ce10e25540c7968a4390591040da11649e5ac282d31589914b04a
SHA5129f8ddade55213d6004f8f6c674da64ebf6f4cf8aa38d0d707e91605ac0520441e6bad494c27e046a1537a3fa1ab50582e3807d25ffae29fd4461d2557fb46cd2