Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
d01167ba90400b140d55b1c1e5826c8f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d01167ba90400b140d55b1c1e5826c8f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d01167ba90400b140d55b1c1e5826c8f_JaffaCakes118.html
-
Size
139KB
-
MD5
d01167ba90400b140d55b1c1e5826c8f
-
SHA1
bcb05db4bd2e7a9cd67208ac25f6706884060519
-
SHA256
9267b235ac60a107c0905beac133a75c9da4fef3f2d7470dfeffce5399d6a467
-
SHA512
6974c605348168abf91c5f98f7cbbee5e6c40cb4cb7568301ffa7d3d865d3f455e3434b4b1aa580107cc40ea2e2f2103949764354c3326e346dcfb4e9b424272
-
SSDEEP
1536:SWNhXaol4xuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SWvKoyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4104 msedge.exe 4104 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 4808 4104 msedge.exe 85 PID 4104 wrote to memory of 4808 4104 msedge.exe 85 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 1848 4104 msedge.exe 86 PID 4104 wrote to memory of 4804 4104 msedge.exe 87 PID 4104 wrote to memory of 4804 4104 msedge.exe 87 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88 PID 4104 wrote to memory of 4416 4104 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d01167ba90400b140d55b1c1e5826c8f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1c1646f8,0x7ffe1c164708,0x7ffe1c1647182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,3973185567315604306,5790101622720136790,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,3973185567315604306,5790101622720136790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,3973185567315604306,5790101622720136790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3973185567315604306,5790101622720136790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3973185567315604306,5790101622720136790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1848 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,3973185567315604306,5790101622720136790,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD50827eee656494fdfdf5bf12cbf0401fa
SHA18803f70776a67b73051dab8cab21e57a381693db
SHA256bcb8671d404b7a2f22b69b181ffa72a0e6329990a7e1e3d827e3eb6db6f83fb0
SHA51251cbe7868e6d3fcdaf1b08df5b3cb0d53589fbd7b0e46f7d7253bd87d7a6cc4a2f8142a9779cc04377e30f95809b5c09e5bb4a8b85a9cf570576816a5552e49f
-
Filesize
5KB
MD592a697be7a778ec9cb0660c3fbb03d76
SHA10a06c31e5acd7934e8b1b758154fda503ba636d6
SHA256d8e4b7e0b0bf4cf05e531f503eeee7fe118e3cb04270dbdd29c3ed9bae5106e3
SHA512ceac26e0d3202b902f00d76638a5ad95ff7525510870cc45660fdd246d0ee6c5ae322d3d39d4353508522044d5cf91f32534c78d09464b00583b66d2db7c2b50
-
Filesize
10KB
MD5a33e34d1d8d441ed75b674a7df3f4e8d
SHA1c20e75a85eac0c70a24b87cdbe393a3b47263b4e
SHA256d979c6f511c8e79d37e474f2362a4644238b88226eab10ae722eedfff9aae674
SHA5123773429fea2d4f00a7c423781dd9ee26e3d0e9ec0f7e9c2a9e5e3f7edfc107fd559e8c542310b479da7bc7207c9a88b209b809034aa39c451d1b4ac00bd41445