Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
d56505f4c617c78a58c20d849f3e1ec7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d56505f4c617c78a58c20d849f3e1ec7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d56505f4c617c78a58c20d849f3e1ec7_JaffaCakes118.html
-
Size
19KB
-
MD5
d56505f4c617c78a58c20d849f3e1ec7
-
SHA1
59cf4c05ace57540fa4af0e8a21ff8c457e683d6
-
SHA256
b9fc219097ba455b931b4465175ed00fe15c2b23d7139fb8c863d0a44d81ffec
-
SHA512
d58ba3119cf73179b9079cdf2dba53e37781f261ac9ac97e59b2acd1af750e1faf659ccd3e8607dc79cb9bb717244bea170a980da6ddf5ad1bef9d83d7c87024
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIW4CzUnjBhW482qDB8:SIMd0I5nvHRsvWLxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 2292 msedge.exe 2292 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe 2232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 532 2292 msedge.exe 83 PID 2292 wrote to memory of 532 2292 msedge.exe 83 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 3528 2292 msedge.exe 86 PID 2292 wrote to memory of 4612 2292 msedge.exe 87 PID 2292 wrote to memory of 4612 2292 msedge.exe 87 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88 PID 2292 wrote to memory of 3936 2292 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d56505f4c617c78a58c20d849f3e1ec7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6cd046f8,0x7fff6cd04708,0x7fff6cd047182⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2781766218814824982,6520010434281470863,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2781766218814824982,6520010434281470863,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2781766218814824982,6520010434281470863,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2781766218814824982,6520010434281470863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2781766218814824982,6520010434281470863,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2781766218814824982,6520010434281470863,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5831eb2dbc15841dc4c561841dd107ddc
SHA10f41083df0d4e2453d9baee6615202699b4cb885
SHA2560519f203112e3d1457a5672a270591b5263ee9696358f23a78ac50592d46257b
SHA512fd10cd8986bbb20f076f639b6a1e1658a4692d168d4c00d607a7e2517ecbf7f6566805c0f7db8a49be6d9f68010dfa3663a014a313e2f3d6243aeb6638dd6e20
-
Filesize
6KB
MD5ab87719400e2bd346e655efd6a3aaf9b
SHA1c59f56a872dea6ac202175cdc2cf5e950d809b45
SHA256d8f68f74b802cd50aeae51b192552962439aaa61a4ee7bb539f1b8998fe77752
SHA512cd3b513845f73c15904f1a34280a81bf87e62adba172ed09979296b01fd7b7ed15d66774aefff7698b74056169abd42c7bc45ec2852e9ee483846455d4e13424
-
Filesize
6KB
MD511414e4c6fbe9e53dc0d2b18f1bb1405
SHA153a413f73066725e33b9dc224775f5cfc243726d
SHA256e66d51be3f298fb4fc245f0de7ebc3d54f69f8827b875cdacf5554419d343499
SHA512c25b43fba3d1110c6e964008f06394c3331f14ffd86815b9a777c9939bf3ef0bb00d4ebb62a4f92cb3bb2a5a1026f563279b001fbde6cf6b0c3dfc2abb89a72b
-
Filesize
10KB
MD562df03fcae040bc05f8591a96a3bc214
SHA13e1d646efa05cd455bacb56bf10a43eeef14f500
SHA25624b93314e6cb56315f89340dcf564ffe6c37027ffdf134bc5b9d34413693618f
SHA512dd84b8767252ce8bb15a61a6fa3608213e3f82798340f7dd9a795254391c4f690fb00bede58ad594d171e883662a2e3c282c39254ff6b4cbfb100432e1d0a68f