Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
d6f2785517ebf5303834d678585ad97a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6f2785517ebf5303834d678585ad97a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6f2785517ebf5303834d678585ad97a_JaffaCakes118.html
-
Size
214KB
-
MD5
d6f2785517ebf5303834d678585ad97a
-
SHA1
04eeedf922660e22edae65a9e62b9c8804d11c68
-
SHA256
40357d6cc5f02186dc9f1cf2a2f1f5d14a0ed88ef9bdf3ab1b5748288a0ef5e2
-
SHA512
c33bef5d87bfd430e28eaeab400376f4e020619f8a3fa1dcbfc52d0948788aeea407842b2013d8fa33d0f5ac6ac43d0fd3e26159f6f6b0b24bc9a768cd2fc39f
-
SSDEEP
3072:CrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJT:Kz9VxLY7iAVLTBQJlT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1912 msedge.exe 1912 msedge.exe 4392 msedge.exe 4392 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4604 4392 msedge.exe 85 PID 4392 wrote to memory of 4604 4392 msedge.exe 85 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1612 4392 msedge.exe 86 PID 4392 wrote to memory of 1912 4392 msedge.exe 87 PID 4392 wrote to memory of 1912 4392 msedge.exe 87 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88 PID 4392 wrote to memory of 3640 4392 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6f2785517ebf5303834d678585ad97a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdcac46f8,0x7fffdcac4708,0x7fffdcac47182⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17828354220817848122,3209112195371490154,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17828354220817848122,3209112195371490154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17828354220817848122,3209112195371490154,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17828354220817848122,3209112195371490154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17828354220817848122,3209112195371490154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17828354220817848122,3209112195371490154,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5cc953a1932abb12e0625013c90e317c2
SHA1bd2480ee4568c91eef09f361e3f4ff9fc7fc73e5
SHA25688bcbe54ffd076e463c9e4519044b0eb31827c1e3052093f167359dba2763e89
SHA512e95857d713e8214e6077edec9c831e4a8e00c61ab38544e99c1dd31a50279633d9fd98528b1389f4fd648094e32515803838e515a4d51fe1af475ff270c3e88c
-
Filesize
6KB
MD5731964a90cb6726efed0c2d36d3a7af2
SHA1522c8252294a9e361fd36b254b12e5311c078dfd
SHA25648ca7c7aac20b51be3a444348cc5460aaf298747e65ccd9aef86c4bd53dc39e5
SHA512f0a85013cac8e1a07d04bfa02fa3d67efca9908a90a6fc832e416e4bcc3f2d4e336665334a4c81c3c89c1eeb1f99a642d8af6f2ccfd006d8561c8621fe4c3a55
-
Filesize
6KB
MD52627e118176338c0ea8e294e2fd42eab
SHA1b891fffd3a3bf1cffb40a7893666f907b5a67878
SHA256ae4ba4daff116c847c67009be774c75bc238ea1e35ca67e2aeb7a38c7e2fb872
SHA512c17e4e26c831b71a973138edf516cf8807eb668acfef4ffd77e06ece17c0eb69c9b17461042e65272f5fb86111efd7334c182b0403a93428e0fa28e98b40d166
-
Filesize
10KB
MD593c37c1c84a80578d0aaff8012468d4f
SHA1095c030eda587e88f81395fccf02e74383f1ce86
SHA256d8205fee4b9dedc4f5539e27af1b88482aabc8293015867b0f071edb250e29a9
SHA51245f3b78a0745b6d2a526c9fbb9a2164bc7eb2783859e9de33b23c99a0849765d7b26096c93474c5fcf3738e04a0d5fe8f45b8c973db79f5aaae64c41334c2c6b