Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
eaafb0a0039fd22a5397480823d05046_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaafb0a0039fd22a5397480823d05046_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaafb0a0039fd22a5397480823d05046_JaffaCakes118.html
-
Size
200KB
-
MD5
eaafb0a0039fd22a5397480823d05046
-
SHA1
85a824ce2307c1dcba73bd5e97374c66bc64b998
-
SHA256
3e725ca4634c37dc953ab1e26a23c58ad4799f95bd6b91a025872d29ed73dfce
-
SHA512
4c3f428b1ffd88876eec9ad2b3e29c44eaae38e107274a3f5f5b648b30d82b9479798217dc92ac6ec65d407240bd9277cb0080c0382925f95bd8fb2b890d19ac
-
SSDEEP
3072:ZxVveUCyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:ZvtHsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2764 1424 msedge.exe 84 PID 1424 wrote to memory of 2764 1424 msedge.exe 84 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4008 1424 msedge.exe 85 PID 1424 wrote to memory of 4028 1424 msedge.exe 86 PID 1424 wrote to memory of 4028 1424 msedge.exe 86 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87 PID 1424 wrote to memory of 2324 1424 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eaafb0a0039fd22a5397480823d05046_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffdfbb046f8,0x7ffdfbb04708,0x7ffdfbb047182⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13077254350923596378,7270825045781281688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13077254350923596378,7270825045781281688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13077254350923596378,7270825045781281688,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13077254350923596378,7270825045781281688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13077254350923596378,7270825045781281688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
6KB
MD5d432e3238961d09b235dd8f5ae9b7f73
SHA19f52eda0429e8df77c3f41373b8594d428817d1d
SHA256f8d26ff61052fb8c09281995957f6b16f53a4e3c50376be2418e63e0da3c134f
SHA512443eb944c5e2a908d76893abcdd5607d660f555a58f9b8daf54a4e0f21043fb4f5d1a0ade07542af410175d3e59d83f7110b1612423a22b72d2def73b7febc8e
-
Filesize
6KB
MD5b5456c5b3e9f574fd39bfffa877e70ef
SHA198664adad406cee5789a68ec6c82a7fab8c02a9c
SHA256104fbee7236febe9740ad9b725b2f528b4fb27382bb6d07c2e5322a2af76a87f
SHA512f05c8ff526a8bc0e7898786ab82145d22682e240329282bde6dfcbd4acb1e35af2cf0b61dc05eee48e3412d8ebc8a58a317710b06dcf50fead39c94973a62141
-
Filesize
6KB
MD5a0cf7adbc7b16c1d596d83264ac42477
SHA1c834e812a778c173af5de9e4dd7f1b191f2361cc
SHA256cdacc7d32407ce644867db35255b3929a640d63996fd1d4b07ecf28d8395c6b6
SHA512082251814118144befced015d001e1618a027ce2c48f3c49df1f0d87462480003a4e0b9e47e53613fe1e9db709484b22756ee72fc1cf48a676eb5327c8bfa6bf
-
Filesize
10KB
MD5a81f721fce7b4667839a1c17ed02970f
SHA16ddb87598a6bfaabf17cab2ea521c395310a515b
SHA25613d1fc45e250750a668261df6531a5e53d2b164f86c092ff1347b95c3f46862f
SHA51228881e8b5d6c44f63fe6815214d28a2d19d176619c15ee282565601aaf17dd1319c195ebcae734c460302d2055ddd49a0a2c21e620f4061b70340d5aa2649356
-
Filesize
10KB
MD5e829a338f4e36e8eb08dad01a7884fca
SHA13e12ed5c02abdebdc07c8f8189126ac93fdc0504
SHA2563d2166f3b14a923a51d5cfde74e76afd66826f77177bcc7cbafa5df8946e5573
SHA512f52bb7422ea336c5ee1aa0b3698a4e38e6d2de96a6e68114d76752c6a59fbbbb637fb48d268dc7ba615b23cb35aa03bc691bf61995a440001563b900a741df03
-
Filesize
264KB
MD55b0dd8ea7b7249cec4242790b3e7588a
SHA1ce34179f55bbd0291ed0f7eceb898a1496e66856
SHA25658c945c5dc28fb0e6906c9332bf4d28bac1b8503e91051858dc4962bf9523cc3
SHA512f002c3735f10de3dcbbb022e3e37d5be460eaed7938e66856d00f0ac29b26298cf5635cf8f0bebc26b991cc262e4224354ee30e771c1cb60c98434b32a3dd31d