Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
c90312034a3aa96044238adcb9482a67_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c90312034a3aa96044238adcb9482a67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c90312034a3aa96044238adcb9482a67_JaffaCakes118.html
-
Size
160KB
-
MD5
c90312034a3aa96044238adcb9482a67
-
SHA1
facdedc16119dd16ee825627db7fb90d40c92931
-
SHA256
458cf25e3d2af53b9ac8547cd02689f6a1f728c5935937bb7dd9da0b7e63110d
-
SHA512
830fe6c5ba8ab289e7f943ebf13f71c441e50597e233740e8e63f52064b46641910d4030e71a950f18bc90b64f287973a8bcf06e82d11ecdee75ba82bd0698e0
-
SSDEEP
3072:S6V1y7KhTEVnvyfkMY+BES09JXAnyrZalI+YQ:S6nhg6sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2640 msedge.exe 2640 msedge.exe 4904 msedge.exe 4904 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4116 4904 msedge.exe 86 PID 4904 wrote to memory of 4116 4904 msedge.exe 86 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 1164 4904 msedge.exe 87 PID 4904 wrote to memory of 2640 4904 msedge.exe 88 PID 4904 wrote to memory of 2640 4904 msedge.exe 88 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89 PID 4904 wrote to memory of 4924 4904 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c90312034a3aa96044238adcb9482a67_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa23db46f8,0x7ffa23db4708,0x7ffa23db47182⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5005959875828372756,3719148710919665529,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,5005959875828372756,3719148710919665529,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,5005959875828372756,3719148710919665529,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5005959875828372756,3719148710919665529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5005959875828372756,3719148710919665529,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5005959875828372756,3719148710919665529,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD512405aa5dba24151794c9e355508729b
SHA1cfd193d86863de611d431e8be6b657a607d1bccb
SHA2567401132e46bcd8089ca816c472e3def141da87873fcd44d793bd385024c9ed6b
SHA512301344ce6ed63c843699f183d16f0a72a262dcea5e249e2f1c7985d19a899add7efb63e384180126902251029d39342daa173a800fad7161da901669b2299523
-
Filesize
6KB
MD50db036e9f5c599c1047cd65c40ec6533
SHA1f6733e752b396c73c42590bbaf8b63cd313820e5
SHA2560335707772b9719846d24bd649e8819b285e8204ceca5a880c35b6cf4b9b1b90
SHA5122964227909333f03b634303bcf38069b70852c06fec1dfa9cef1e6818264712ba98e73b268302e85d6a407ccc073dec5fc6eab1390232d7effa1912ccf1f584b
-
Filesize
10KB
MD575b9e61fbcbb77a7b9e0980b8bb5fa13
SHA1d7a349533b78f6fc7cdbf51bc924f1caaf2cabea
SHA2566c9f961dcbf9b30069d74bce142cb5a8b7e546fffbf30ab85637fd2a9f6cdb5e
SHA5128bb27c9c3a3224d8841a61357c9fc5c142fe611a7fdfe1de341a9444807ed5dc89cbd8e5918a5066b3bb0919e96da1b8af669bb6dafa0f0394aa76192234f3f9