Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
ea3c0593b8140136d6fe16e607cb7c30_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea3c0593b8140136d6fe16e607cb7c30_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea3c0593b8140136d6fe16e607cb7c30_JaffaCakes118.html
-
Size
174KB
-
MD5
ea3c0593b8140136d6fe16e607cb7c30
-
SHA1
64efb6d4b0838fd6b62f9aa72d4a3588594437fa
-
SHA256
f73ec5ca19008f26e210dda8304bb0897127c2e2f9c666b967cb7cf4a4c509c7
-
SHA512
2eab1139ac3955cb755236196da11d2b5256a755c184129d355a03e294217df29e9b2470634ddacb0a14be23deb64b3bccf0e37cd41a2e0d3f8925e7434f3c82
-
SSDEEP
3072:Srx+0AsaVZ5zexoaC9MjxoGG3yq5wdt2iOlp3UHEvD1g+ARoakWzlkCEl2YyfkMN:S1XvaVZ5zexoaC9MjxoGG3yq5wdt2iOG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4072 msedge.exe 4072 msedge.exe 3020 msedge.exe 3020 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3020 wrote to memory of 1320 3020 msedge.exe 82 PID 3020 wrote to memory of 1320 3020 msedge.exe 82 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 3712 3020 msedge.exe 83 PID 3020 wrote to memory of 4072 3020 msedge.exe 84 PID 3020 wrote to memory of 4072 3020 msedge.exe 84 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85 PID 3020 wrote to memory of 1308 3020 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea3c0593b8140136d6fe16e607cb7c30_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee2f446f8,0x7ffee2f44708,0x7ffee2f447182⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10298567424767934523,13613645877792936658,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10298567424767934523,13613645877792936658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10298567424767934523,13613645877792936658,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10298567424767934523,13613645877792936658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10298567424767934523,13613645877792936658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10298567424767934523,13613645877792936658,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5172388aaf362d45d5e220c8416f3c6dd
SHA13affb19e4d4f62c37352d2d618baa822e5f7a57b
SHA2566afe9fb6fb8367753a8687d10f13c56c9c543d8015a669ffb3af7b0a4869d7d9
SHA512143c8bcd68c1e7db48b2f8f6a9cb0e4cb589dbfdc23052372a4ef351152a80632aa128bc2919020f19df7f11832b9785c77994310bec1af85879179a9da3aaf9
-
Filesize
6KB
MD5c529969fce0749c70fb5b3882a535784
SHA1c61653ec7586283ff09afa9fa0f709609db31798
SHA2562fd6afda9ecdf9e17649723320645c51768465b94eb7553457f0c9ed879addfc
SHA5123b4573d1f5ab760e2c09a255ec870015688b47a456b95463992ebd6c759c621033ed9b404a7c20fb5e97a778b45c640221e7f58766061da9ec843f0fd360c77a
-
Filesize
10KB
MD551e4feeb6315033548fef7b387baf97d
SHA1d689947030a14f902a16a4a744dbbce8900e1154
SHA256b1a73844d47a1027e067566f112316050e519b33e2d5e06ebb4b5e4377873dc9
SHA512bb559db82f3ad8141854d23f746e7e332d1fbcacacd038a497997fcc04a05230737824631be747ff6dbf596c7d6288663fefb563af3e53d19fd2d13243b28cfe