Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
d4c3677708eba0298fb1743c4a4f632f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d4c3677708eba0298fb1743c4a4f632f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4c3677708eba0298fb1743c4a4f632f_JaffaCakes118.html
-
Size
39KB
-
MD5
d4c3677708eba0298fb1743c4a4f632f
-
SHA1
58d0eb88c06a862cd75da9eff4b99fd3cb3fb90c
-
SHA256
381692109c7f944247c24353dc83d2f05e465807364e94f9c070de060e476b80
-
SHA512
db626105b9dff2e2978ae3f8814c379eee812e5ac3e12416e2c76afdc3ff77d92275a56d3994a6ad62e88e42e93996e5d249343df86cfce11eca51f50093ba50
-
SSDEEP
384:Srf0Ad6h7K3qGK9kF4gU8+xNlm3hZmeQjZjJIwNxMfLxMfixMv2jpxMTqkOX/kLo:SLghe6GK998WlBjZjRpVCSMERTGyijKU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1780 msedge.exe 1780 msedge.exe 3488 msedge.exe 3488 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3488 wrote to memory of 2932 3488 msedge.exe 83 PID 3488 wrote to memory of 2932 3488 msedge.exe 83 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1836 3488 msedge.exe 84 PID 3488 wrote to memory of 1780 3488 msedge.exe 85 PID 3488 wrote to memory of 1780 3488 msedge.exe 85 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86 PID 3488 wrote to memory of 2272 3488 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4c3677708eba0298fb1743c4a4f632f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,12699604073115665489,11153617130441349915,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,12699604073115665489,11153617130441349915,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,12699604073115665489,11153617130441349915,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12699604073115665489,11153617130441349915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12699604073115665489,11153617130441349915,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,12699604073115665489,11153617130441349915,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
260B
MD5d8daab02be0adb653657a28cb538f670
SHA1c58d39d8229f6da3ee3998882bcddf06ede2a6f8
SHA256f06a99fa894115c99ea12fd4c4fba68c7039ee188f7f042f3b2c520cfb35a4eb
SHA512d432c45fc10300ad0d4d9decb446fbbce407131f7fc3e16b8186ddad9f684284f6a9f155b332e59a5875af86ff5469345a7fa52cc995b6ac1e8a098518623656
-
Filesize
5KB
MD50a13416282f3c95404aa2ee07b3ede0e
SHA1961c1ed98b3a918a66765886d40a2d595190e857
SHA256703442b5ac706a603b8c0a8eae8cb9ed7da961969ebf5cc002a06653809b2ad2
SHA512de65a5ceac1b7616a1eb70c2f62f98be741876a1d2f26f9493aa2b1e2ab7a2e2a53130bb6eb48aae122b0114573bc889d8b72c8f458de99afff3aa7b5108d9a9
-
Filesize
6KB
MD58bb90866fe6902d76690d88b72846892
SHA1b4ed8486391a920740a30a512933899032a37b5d
SHA256c631e12962110c0ee50e7bbb6a7dfd696a3a4005860f0074a6fa4070ba721f28
SHA5129c412fa5904fab1c177cbd56e001a48e9e6a1bced7fb5057a26efa341eb3917e1a96cda4779422a40a73a6554db68c03af1694044a50b870ca19cda8e5f33b5f
-
Filesize
10KB
MD504e4cbcccc266197232b67cf960e5140
SHA1f0dd082b616e71641f9a8dc6cf1d00ddf4c6c1fd
SHA256dfb24e37ad2d4dddd89aa3e2396c40109d7b607ee3e3fc02fcd15a3b9c66e1ec
SHA5127a7af36b50007e565e1d74e549289ad2ce9172e5e6eda08cfa04934143bb0553ce498a03f1f482e22d18504da541ce21fa5be0a1eebe68baffc736601d65c74b