Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
e9e738c080f4099ef5d587150f15b61a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e9e738c080f4099ef5d587150f15b61a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9e738c080f4099ef5d587150f15b61a_JaffaCakes118.html
-
Size
169KB
-
MD5
e9e738c080f4099ef5d587150f15b61a
-
SHA1
f291530601e3988779b6967af87207d44d552e99
-
SHA256
cf113f5a6c69672e25541762529c1727aaa5e09075483978a05c82e3b44a0270
-
SHA512
2c49705803e029bfbdfe97f5c86b75294134470150f4667e4e5d38401d39dd93a7c00e55eef082832662f118750fe36eb1c1a01d1eb878c4bb51625c6b810a08
-
SSDEEP
3072:SD61+AfElyfkMY+BES09JXAnyrZalI+YQ:SD6wAfEQsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3388 msedge.exe 3388 msedge.exe 3028 msedge.exe 3028 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3020 3028 msedge.exe 82 PID 3028 wrote to memory of 3020 3028 msedge.exe 82 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3396 3028 msedge.exe 83 PID 3028 wrote to memory of 3388 3028 msedge.exe 84 PID 3028 wrote to memory of 3388 3028 msedge.exe 84 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85 PID 3028 wrote to memory of 3636 3028 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e9e738c080f4099ef5d587150f15b61a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7b6546f8,0x7ffa7b654708,0x7ffa7b6547182⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12571357223198621878,11935672428020052871,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,12571357223198621878,11935672428020052871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,12571357223198621878,11935672428020052871,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12571357223198621878,11935672428020052871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12571357223198621878,11935672428020052871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12571357223198621878,11935672428020052871,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD5c92574c44e047e3e579b25427bbc1002
SHA1dbe9b8962ad0e297d30377a8daaf481de1383792
SHA2566b188073e7d0d50143236c37c82e16b3ac88e04fd233a889deb7ad8a0d59fa63
SHA51279657735c1635f109ccb9a1ab9594b86de4ac14c82e49cf2181d2c0f926cec3311f4cd831b01527b142f4a6fd81a89137f92708697cbebfb09e399a5f617a189
-
Filesize
6KB
MD5f370a203c29fb2bd78edd7aab1937e98
SHA19cd58a77b26148e5ebe5f67e42f9dec90b68c979
SHA256b89b058ca7ed14615783b1ee04370e4adc7295c83f8053a34b5e55ee711b0819
SHA51273a01135d3ab1b7ee477bab6b2037d2d068da1b26a3e92f67a8ea537e46e6b741d390a22c15e5b30a1be29a306a24d9c8e4aa8720a4ddb133aa5fa8385009e81
-
Filesize
10KB
MD5ac46142c3f050c1e27f4604e2276d1e5
SHA19fdd847c6f413eb9730ddec0758c9363452d5722
SHA2567780b0ef7cbc6dc6c34c27f82646eb8b8dda8eaaac73a6e5ea6c6ccba4aa160d
SHA51284af334fe208c61adf193c6b5761ca09c966d2e7e6d760b29b61caefd05216379ba9f75054513b121e8c2178772df58524ff0107a653652a2ab446ae6e2cab75