Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
d0754521f40a847cea01040d2e534591_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0754521f40a847cea01040d2e534591_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0754521f40a847cea01040d2e534591_JaffaCakes118.html
-
Size
141KB
-
MD5
d0754521f40a847cea01040d2e534591
-
SHA1
600942e9dce5aa4562a01f218ea1fed3c2845c7a
-
SHA256
17bc261cd090e83fd74c727d73ecad85a8d778fe7d35a808c5ea3447b7a546ae
-
SHA512
2da796fa8e2f03f7e6654dfb464e77f01e4ea2007774f95e69e85a015eb4422ea9f48abbddab817e2974a5642304d76900db9d254ee412bcec8e2c4a2e502c0f
-
SSDEEP
1536:SnSl1Lsz8etgx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SmOcx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 4392 msedge.exe 4392 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4552 4392 msedge.exe 83 PID 4392 wrote to memory of 4552 4392 msedge.exe 83 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 2176 4392 msedge.exe 84 PID 4392 wrote to memory of 3992 4392 msedge.exe 85 PID 4392 wrote to memory of 3992 4392 msedge.exe 85 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86 PID 4392 wrote to memory of 2260 4392 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d0754521f40a847cea01040d2e534591_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5f9846f8,0x7ffe5f984708,0x7ffe5f9847182⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3200600143677954357,17914047984291525117,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,3200600143677954357,17914047984291525117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,3200600143677954357,17914047984291525117,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3200600143677954357,17914047984291525117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,3200600143677954357,17914047984291525117,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,3200600143677954357,17914047984291525117,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
6KB
MD5ce5f463790c69f29a9caec022b1b9f6c
SHA185dc1fe1530e77925991f143471f4bec4cfffe32
SHA256b93ba8d66d59815c248efe4b4cce85bc3c27cc07635defd74297e64ed06a5e3d
SHA512c28d4303838a11693eece9384f3e7ae8b44e32d0139ffbc0262021e3f7240e33b8e1e9763b5d0ac66e287f15dba88a9b8f7e11e3f1e2fb8cec54d2435a1c81bd
-
Filesize
5KB
MD5c7fa2547c99bce38b67fc985cbb2b678
SHA1913f89ff886af852619536c63c6645856d0c08a2
SHA25604dd56beb0c6fc2c9e2b2e080133338acb9c062900f095078175efbbacc00aae
SHA512d81b08408660cacc42454fbc65228a0ad62478b9848bf4afc81d9e12328b563ad86002e9c9542265cf852c20200f6455db8b8b9fca6356d820771caea665eb06
-
Filesize
10KB
MD5fe09fee4a36098ee6b035eeaf08e342b
SHA1734d9c689ee647c76908c46576af7ba85d71f680
SHA256001d43d8697aea6dedecc14abb87ce0b7d747720bec292a37482bc8fbb92fb08
SHA5128e9574be577afcd5c53c8ee9b9d96c42967513278ac82a06c65f2346ea946e51c30055342bd393abf03ab615858ae8569ff72f4ee464cbf10e4092ae640cc804