Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
da0bb37a8ccf9e23b3657e207eef8469_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da0bb37a8ccf9e23b3657e207eef8469_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da0bb37a8ccf9e23b3657e207eef8469_JaffaCakes118.html
-
Size
152KB
-
MD5
da0bb37a8ccf9e23b3657e207eef8469
-
SHA1
9cb08c9a0901e7207e9095a93302a56b5e07dbe0
-
SHA256
5909d59566bcb7f85c404d64fed62bb2fb52a7b639aa0cfe7aad3b1969edb984
-
SHA512
30249e809765fcd99ec5acd218c2be34720409289ebbcb8e3f672eff6d77328f497afa4cbd8b540ed429e8e5dfd1b0a47380f61d5928de1ad4713e4a4fbcad1c
-
SSDEEP
3072:S0D91d08oYPdjFVEa89yujVhZehwQtfoC70nYpmlS5LI82C/Qf6ZPsQrJj/I752Z:Suc6vKrSsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 4852 2940 msedge.exe 83 PID 2940 wrote to memory of 4852 2940 msedge.exe 83 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4628 2940 msedge.exe 84 PID 2940 wrote to memory of 4864 2940 msedge.exe 85 PID 2940 wrote to memory of 4864 2940 msedge.exe 85 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86 PID 2940 wrote to memory of 3372 2940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\da0bb37a8ccf9e23b3657e207eef8469_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91f3746f8,0x7ff91f374708,0x7ff91f3747182⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5257970479798854070,3749774850856289480,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,5257970479798854070,3749774850856289480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,5257970479798854070,3749774850856289480,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5257970479798854070,3749774850856289480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5257970479798854070,3749774850856289480,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5257970479798854070,3749774850856289480,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5b3192799c291d6f560b7153cf77bfef4
SHA10895cd2e9f7c75d14694462c2b49b1f6011ff0b9
SHA256be4b09dab3278f521a77c8296e2842f9208e91e9e1538dd453b4d70d0ed85159
SHA51258ac4f1430c1dd7f763e2399da0d1ffd3dac789b40cd5b2225329b4c9b72a67df4ad40a35f0a42d0e7dc0b05b00b07139acad5868fa4267e7131472548d02f80
-
Filesize
6KB
MD5ed8695f9b4c618cbd95493396b308e0f
SHA13926a8e4d930a9ce7d6d25cb6e2013adcc6afb0f
SHA256959708d2993c6ef4b56919e6411bf5e2ea626eb820a143326e84af2e47bf04fe
SHA51206bf838c45a42aca63f5edb9bfa178837717e3b24bb37bea8279d57370b6ee08e8a33f902ca92181ecd4ec15e5b98c48b7334a0f0567f409f0fcbc370d9b72c3
-
Filesize
10KB
MD51bf23baefa519a094943f0a6186ab12d
SHA12054dcfbfb7f4e83dac33b4294aece2ff290ae3e
SHA256d3d23475179cc8d7b914cff4440ab85c610e2302262cb4bfdb3ba4de02730571
SHA5125bed6eb0157d87a6c73e944fb6b78d02683072040dc7316015ea4db61ff51d28044e49f60aae2140aaf87c38db2ab011a813bf9817b22549db79e13294093a7d