Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 18:57
Static task
static1
Behavioral task
behavioral1
Sample
d6e94318ba55bebabfb06ac12b517997_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6e94318ba55bebabfb06ac12b517997_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6e94318ba55bebabfb06ac12b517997_JaffaCakes118.html
-
Size
139KB
-
MD5
d6e94318ba55bebabfb06ac12b517997
-
SHA1
79cbd24ee3f82a5e14e0ebd30ed868bf5196c7b7
-
SHA256
1121f0b598cc65e691b38aef3d8aba198c1974c3c8dbdbe6db88784e661d95a6
-
SHA512
0f8fa50d2fc0ad6586fdbd894b7e5fc23434bf22763b8a9a5c661cd05496ca7fea76bff37f348083775f94d3374cb1323728186406adddc952ff589ab465842c
-
SSDEEP
1536:SUrk05HolofyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SUx5xyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 4748 msedge.exe 4748 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 4992 4748 msedge.exe 83 PID 4748 wrote to memory of 4992 4748 msedge.exe 83 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 3032 4748 msedge.exe 84 PID 4748 wrote to memory of 4176 4748 msedge.exe 85 PID 4748 wrote to memory of 4176 4748 msedge.exe 85 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86 PID 4748 wrote to memory of 4312 4748 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6e94318ba55bebabfb06ac12b517997_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffa50b46f8,0x7fffa50b4708,0x7fffa50b47182⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15214911370967190732,13850332466730099866,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,15214911370967190732,13850332466730099866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,15214911370967190732,13850332466730099866,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15214911370967190732,13850332466730099866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,15214911370967190732,13850332466730099866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,15214911370967190732,13850332466730099866,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2760
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD54622a0e6e8f269d7f3c3de52205f2061
SHA1e59c5afc63d03940bd9abed17666916ef6ca2f39
SHA256216a3028b8ad765d2e9b8e9ffaf56e7bc35889657fba43cb0995596519d332d7
SHA512fd48ecd793b09688944e6185d1f4fcfae6861b0a1ab4004ae70f6d1f7314fe3b950d32aef65a1f1f54b9c8116c11ed45bafa108215a2faff859829a74062b116
-
Filesize
6KB
MD5d5093e46c76347735310ee5462b30c96
SHA11747ae16aa66837ab72595381f6220ff6af693d3
SHA2560edb59811680b9cddb9c4b07de31552874b23d58624d7b8447fc4c8ec7a80a1a
SHA5127b36febc410ba41d6679196c06e7ae7f21ead432828d063e95fff6539b1273524bc72c26e39869bd444c9b7ad5105b58795efe253dfe39946f73d5fe4ec72406
-
Filesize
10KB
MD579bfdf088fb193366ceae3ba101d9186
SHA12e2a939c49c4502364a7deffc2c3c111c626bc31
SHA2569fee51b8c304edf93417dea6d9c1c4835c08f6cd08f66b2201acd8cf13d76705
SHA512a938726631c0c699fc2d0a330d4acb5a5c6a9dd14637fa3a1f5311adba4d966a65bcaad02c4ba4300cb19290382e5990d47afd04de5778893d35e2679ea52743