Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
d59f51acf59f0289e487d506cbf1bd01_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d59f51acf59f0289e487d506cbf1bd01_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d59f51acf59f0289e487d506cbf1bd01_JaffaCakes118.html
-
Size
177KB
-
MD5
d59f51acf59f0289e487d506cbf1bd01
-
SHA1
a6091696fceaa85f8dcd36b7890f4d08161bd204
-
SHA256
b9163dbc004585993d8333dbfead8a912839d0920809141e12bc6adacd5d4475
-
SHA512
19bdbf07a37c790963cc6d3240023a37793dc74a56f3ab6a8edc41a798d5a63af194e2af69da7159f7b936ca307157f7550bab0ce81593c4e4e5f27aa95e8b53
-
SSDEEP
3072:SKSpyfkMY+BES09JXAnyrZalI+YB56QGt0+aF:SKSMsMYod+X3oI+YB56ft4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 3016 msedge.exe 3016 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3976 3016 msedge.exe 87 PID 3016 wrote to memory of 3976 3016 msedge.exe 87 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 3700 3016 msedge.exe 88 PID 3016 wrote to memory of 4960 3016 msedge.exe 89 PID 3016 wrote to memory of 4960 3016 msedge.exe 89 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90 PID 3016 wrote to memory of 2192 3016 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d59f51acf59f0289e487d506cbf1bd01_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd101246f8,0x7ffd10124708,0x7ffd101247182⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7587993768090951119,12306951825119279196,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7587993768090951119,12306951825119279196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7587993768090951119,12306951825119279196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7587993768090951119,12306951825119279196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7587993768090951119,12306951825119279196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7587993768090951119,12306951825119279196,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
6KB
MD59f9e109dc12e385845b391a65c25bb3e
SHA13f5590b0befe64a9ecc7ecc7ad171b81445a2c54
SHA2569f2131c85efde92947cb4dce37e1a8a86c8bca8ae99773fe66777baa3973a7ca
SHA5125081b2c5ea7af864ad3764d273304d933b90e0609edd0236812f02d0a3acd212a9248f2bf4493a3dc67286a5376366798a27fe9bcfacc9022984de72e2165dea
-
Filesize
5KB
MD5b90fd36138e3f44919a09d5fc409215c
SHA163f83c03777eedc38c729c49d2a486a9658acec3
SHA256e1a94dc23d0e63aba108ea3c8400fe64cbf3f0c93eb765702970013cd72e1c44
SHA512f6f377a67c04b025ecb30f4ecd1b491d5c6087de5e212fe2bb3bfeee2db0c1a59e4b3e3da2a43f4b6a9e66c57eadfb4842060cbb94d93d09234585d6d7783f89
-
Filesize
6KB
MD5852a8c2bee4ee8ec471bd97eb5e80290
SHA101f1603dde86896edf98dc7617b7469a759d5816
SHA25698226b962e949b5010765bcca1849cdd3690db8b8dbcdd13c1bb7f06b28fb39f
SHA512182a0128d39bd577b669a2046d8fecebceea3abb460333b9bb45fa17d91524e33f752f1265532aeed52442736e062ce9d5e231fb3d812c36adfab3fea38315cd
-
Filesize
10KB
MD5a01aa51c5c46574f8ebdbcf4f67933d1
SHA14ce3c98136e034431cee745e072b214551ebf096
SHA256d38380f249073105730e287b704b8daeab00d6df85075ec2873d89e2b6b1a15f
SHA51218679050f6a2b52dff202ad2524bccd9899b942ce8b02dd0396f46e5494c62e2073385816a0ee0fbbcccff266cdada0e804dfac4678b97c1b7b2e1928c533180