Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
c15755cf26db5894bf209adc62251648_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c15755cf26db5894bf209adc62251648_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c15755cf26db5894bf209adc62251648_JaffaCakes118.html
-
Size
207KB
-
MD5
c15755cf26db5894bf209adc62251648
-
SHA1
ac342df2dfb9a8b61c018a674237b4418257bd8c
-
SHA256
7298d22d2ea779daf085ee63b2e136d8e61cd4b734f926405b63d31dc5aafa34
-
SHA512
1e4246b8425fcea01204211ebf9bbabae913e8f2fe745d781077e9d1e8b783ab0441f83ffe3d7165ea03fd3640a85a66312c4d569ebc4379f65d48b7e604eaeb
-
SSDEEP
6144:b530DH6NEQwjcHXxQRVufJc/09f1kiW5D:buDHQmjcxQRVufJc/pD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3080 msedge.exe 3080 msedge.exe 3436 msedge.exe 3436 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe 2380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 3052 3436 msedge.exe 87 PID 3436 wrote to memory of 3052 3436 msedge.exe 87 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3872 3436 msedge.exe 88 PID 3436 wrote to memory of 3080 3436 msedge.exe 89 PID 3436 wrote to memory of 3080 3436 msedge.exe 89 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90 PID 3436 wrote to memory of 4324 3436 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c15755cf26db5894bf209adc62251648_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb979446f8,0x7ffb97944708,0x7ffb979447182⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16536797883767096129,571683587436938409,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16536797883767096129,571683587436938409,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16536797883767096129,571683587436938409,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16536797883767096129,571683587436938409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16536797883767096129,571683587436938409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16536797883767096129,571683587436938409,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16536797883767096129,571683587436938409,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
2KB
MD502a45e4bddc66d8afc9455777f47294c
SHA1506820cdc92e377190034edbf40cd26cc0160eab
SHA256da0c3932a31c67e100317f76f9e52dd3361fe4123c2aac745471e0dfb18e6837
SHA51281ab27ff987830b40be73751a8ebf2c590e761f8624613cd656ceb7e8ffb71f1c119d66f5cc3c99eb57c914c534a8995215dde11474b640325ff6efb51325bf7
-
Filesize
6KB
MD58cabfbddd9dbf7df96895f10a8b02f5a
SHA109c3da3ee99c456cbbd64860f6c9e5018a410d4c
SHA25625bfa13ed9e441ca355409b69e9c87ff52092e9c7ed49dd97b413be2dbd62a2b
SHA51204d6bdfffc54fac296d49181647c7f611d6a6f1c275110b5a892444ff70e2a60d68a9f6797daf6d46167438b1a1cc8029d362afd4c446854f7749dc5dbe8334b
-
Filesize
6KB
MD5192b7f32d2fd983feae989071a7cff19
SHA1a9aa49e210ddb2ef18d93e79a0ffb6e061073dee
SHA256d6c591745972e30c421937d3fbbda2c11ce3f81adc51e9ba1ebabbfb972699da
SHA5120edc1155631737ca444382fe3dc0b625eaa222d6d6a6b30f705983560d9b598c31543468eb2d8d419f5195b22c8afc24d9e021e57c2447505340506b75d91fb9
-
Filesize
6KB
MD5bddef1dbfd2a94c1e0085a30910ee445
SHA183cb36c647476c7f322e353a70088a1023735848
SHA256967e8db367a29b33a4f393798b82dd33fe814b4ba0647bf419964b04e12977e4
SHA5127162684395232ad780e044759c2c1f6ae59390df925b51ecb722b660f5020400897c5b80b8a50b995f0b8d6931aa766d2cb3f8894bbd9d0fc88c977a7c1416ae
-
Filesize
1KB
MD5d58b3c6de2631756c2402ad0d6500fa3
SHA19f35e24c0d114ff25019a7f073074e1580da3e6f
SHA256144d649d4d3c72f953d13d0d21ed643b995a5991bed249eda8b2e483d50223c2
SHA51243518431e0ea5970e959f474b350bcdd2a23fc9e95a206a0f138657668f12a4f035eb7d3770347e62b720a33c4d40c787820fab8e038f2a2acd731e93b3b6a0b
-
Filesize
1KB
MD512b576f8add1e247004766428e4d5a61
SHA1f02259de38a224e5b9388cdbf611094ee5b625ba
SHA25640c0ced988fbdc78848b8f7c5bdfb0a2625b500c61f1aa0c3ed954faa2175014
SHA512142bdeb3de45c20cdbb08096288f0e3321c3f013e39a9ce9605168160ceb6f2ea057ae17948219b6a34e4e6cf21bf37b710f95aa67587602254f6d9cb20eecac
-
Filesize
371B
MD5543e4529d69546a85eef9280f069adad
SHA159f556f99b5655d8303b7deea7e952eeefa06456
SHA256a019ec8831e5642bc3a17b277152210df545a5cde0b2c0eed6537f3584501716
SHA512c700c0413b250a852b1ac8d2204bfde9e333326a3b2b95dfbd84fd58918077afffaf89b406d48e12a1b77c67a5908a947faa5b89f8f8d1742a33a19443b330c7
-
Filesize
10KB
MD5777976f380bd251d66a6b121c07a22ee
SHA19e1a3cde31f0299b51892e54ce96bb9bdf353164
SHA256b0b007a28b2c3cfe8a4b702ebe8076ee79d0df7cdf62ab9359cfae2f2f8399b8
SHA5123289286eb7503d5f45ce3fcbb59cb2c452590353fc4920eeb9a48b6d069a330881ece772aea2e9dd2d323cb1de66a1022803081b999725d31ceef59f2f3fe34f