Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
d0b534f120832e2e78ffe82e45d41ef7_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d0b534f120832e2e78ffe82e45d41ef7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0b534f120832e2e78ffe82e45d41ef7_JaffaCakes118.html
-
Size
139KB
-
MD5
d0b534f120832e2e78ffe82e45d41ef7
-
SHA1
7a734b019fc127fe9ca647d780e4d69ba261d8ef
-
SHA256
d13e167735526ca2c2a52d3fdc67a25f4bfc38f261064d4b6e48710e68a81d64
-
SHA512
d495e822af5dca2bd8d31aee8bbc2e9dbe592614012abd7219935d275361b5470ef5291154dd57fb4e7ef107c4b7162f8f4e8d8dac9177881b2891fc7cbf84c5
-
SSDEEP
1536:SdF5BPi0lJDyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SdhiQyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 1140 msedge.exe 1140 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1472 1140 msedge.exe 85 PID 1140 wrote to memory of 1472 1140 msedge.exe 85 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2996 1140 msedge.exe 86 PID 1140 wrote to memory of 2352 1140 msedge.exe 87 PID 1140 wrote to memory of 2352 1140 msedge.exe 87 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88 PID 1140 wrote to memory of 1828 1140 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d0b534f120832e2e78ffe82e45d41ef7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c5646f8,0x7ffc6c564708,0x7ffc6c5647182⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,1696135482045322906,12852939576399941025,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,1696135482045322906,12852939576399941025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,1696135482045322906,12852939576399941025,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1696135482045322906,12852939576399941025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,1696135482045322906,12852939576399941025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,1696135482045322906,12852939576399941025,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
6KB
MD5f328d836d71842bdc78fb2d212436554
SHA1e2265b121ff73fa75ce462d595c6630e5cc539b0
SHA256e0a193c43243421fea70103ae88c4d38db817840cd5acb11a17c93fac247ae7b
SHA512d6623a3d70b0c5eec91abf48d253aaa9ae4ac759171d619a8322f4b9bf792000c10d7f55eec6e2b3d9d5f7da2df443961d2a7d6a588908924eb3e95e585c6a72
-
Filesize
5KB
MD520eae71a47b83ad1468c79237c432a56
SHA1a4472be78f59fb05e6355c83abdc63740dd4e519
SHA2560a45c5a08403bd923b2dce446973d7d6b5209b1c98721832ba28aab7e046ff77
SHA5129805d1c7348db451b5f5ad3e5e8acf5e242a77c04d5ee3c93a1f57c7fee889aded7722b7c0987a9f3aa6627714337c6f08c2a006a75217ece6ed10a1eede38f1
-
Filesize
10KB
MD5111a1410116e236012114a7cd1edfd1f
SHA1ef7d155dff5ccf2026c172ff586737f1a8038482
SHA2561287c6c15912a2fc472f6fc48fdcc6e487f0dcba4adc209535f05fc753222f1b
SHA5121e75795da2eba3e81bf2c2bdf58c063039d98cbdf0775fb8c754073962a57f32532bb0917a795547714546ac38afeb5d3eeb677874c0b82c26362dfbcda698fc