Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
a874b812dd7e09beb8f26fed4d13d9e2_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a874b812dd7e09beb8f26fed4d13d9e2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a874b812dd7e09beb8f26fed4d13d9e2_JaffaCakes118.html
-
Size
86KB
-
MD5
a874b812dd7e09beb8f26fed4d13d9e2
-
SHA1
1b11b83ba8dbe04c97b8a00825d328803453a956
-
SHA256
f37e2f29b20d63a0ce9c1a19a7efe85b3eb3ac4d05a3b003081ad53ba3193c18
-
SHA512
867f245e6e1b8946a9fbcb3ac4a70103251cf11f4e88fdb79846f8e09a21d75c68a64c8ff118ad66b68fbeb9d3bcd6b8931155b138eea375881613e1a52f8fe8
-
SSDEEP
1536:tlYqfceoC+iTcQ0AasuXmpmcKXQFFk1m13NP9++2dc5KziTTRwo08CBgfQl/569K:VTcQ0AasuXmpmcKAFFkAdTTRwodygfQX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 3176 msedge.exe 3176 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3176 wrote to memory of 4228 3176 msedge.exe 83 PID 3176 wrote to memory of 4228 3176 msedge.exe 83 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 3048 3176 msedge.exe 87 PID 3176 wrote to memory of 4976 3176 msedge.exe 88 PID 3176 wrote to memory of 4976 3176 msedge.exe 88 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89 PID 3176 wrote to memory of 4592 3176 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a874b812dd7e09beb8f26fed4d13d9e2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed10146f8,0x7ffed1014708,0x7ffed10147182⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14690427584612638860,11502547926773418346,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,14690427584612638860,11502547926773418346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,14690427584612638860,11502547926773418346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14690427584612638860,11502547926773418346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14690427584612638860,11502547926773418346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14690427584612638860,11502547926773418346,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
1KB
MD5e4b61e45e24256369e0b239685ce4132
SHA16fba7592d11c7b1ab2075a75d46bb3bac24521a7
SHA25671cd59e6b6848c99d7d6386b9cb88009b1e8a3c41a00db4bac552fcfc662cf8b
SHA512618f7a20cccf9f1b9dd701f7cb1dc3246d74ce79c5951e5b05b57d572a2c1fc8b8b05f32ee4367cd71a5ca2bc92dba55e2c73afd522a14f0a581a80cd6f7663a
-
Filesize
1KB
MD5ede73fd643e3ae00048a2845004eb5ee
SHA1ea2ec563b19217545a8a692197f2a9a0346a5e3d
SHA2568e73b11b987833d934806e69371bc8909cc5885ec1a2fa3691a175db477f7f9e
SHA512e6de625c80f96762854568da051c06141e1cf97e3d3803a09a94c6532e882c3de762ba19fcbf90d1e310aa4c3ae11973c5d054f021b462a4daff1da2a2a8df20
-
Filesize
5KB
MD50273c704b3a77ab40dd81d0ad391abb1
SHA138ada10c42ce9dc9ad41f35e7ce84c9e5b3ce9d1
SHA256e0225ebf773b9e5bbb40e865b4e31d426858a245b59146b51d434beed5e71aa6
SHA512555ec54e9957a3891ffa414038d4d777e1c0bd2459a8837d193c8b119b71ab2aab369b0f5a43d8ade87d91d4c9ddb50349705dcb184fb634efbd62cb2f59f244
-
Filesize
6KB
MD5371b84f9cd4b9bf3b23aab69d5958f74
SHA12ab8c778fbeb0ff5b51d0c7926d137d2d71a22ad
SHA25668d70202354deeff8ed3e183702292222ada0011060ea0ee23e75af2d93a05fa
SHA512460fa8658e6a9d1589a824b0b8619a28077d3c6f70d8c6f139d7deca181b13e3d947ce466b8b75b58704ef693682a1f959bf8dd9dd264f132072db1155bb78d6
-
Filesize
10KB
MD542f5b83274e98c41eb35bf6641ffc8d3
SHA10d5e8f944a00c599edbfc855479a39b4f9eef8b7
SHA2568b9d967cb81aab0cc87f59dfd525f1e67768edc10e4ae6d440b5cf1d5f3f9b3f
SHA512374045deee029123575bd26e97f034e80979d9f292c27075dd9c37f6a51a2c151f1a9e5e82d5997c18fb28c5fb80e35f3010aca572bb95224896ff5cab5e636a