Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
eb6aa0d6c57fd543fe8edc6b3767f1dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb6aa0d6c57fd543fe8edc6b3767f1dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb6aa0d6c57fd543fe8edc6b3767f1dc_JaffaCakes118.html
-
Size
141KB
-
MD5
eb6aa0d6c57fd543fe8edc6b3767f1dc
-
SHA1
8244325101f8087c3351fd58a31d73592fc8746c
-
SHA256
c020a48ae90fcaeed3c7a07b562fbcb14cb10fb2fd72561aeceb7e96b2f5393c
-
SHA512
862fcd201afb48f8f79cede10bc47d1319e4e4a92fd83c6de67b8b95169819c6b9e604902a7b6ba5cd4d54418cf49065f2b9ae387e7a0353d1090e6b18ff22ea
-
SSDEEP
3072:SPt9kZNA8x7dyfkMY+BES09JXAnyrZalI+YQ:SPvkZNA8x7osMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2508 msedge.exe 2508 msedge.exe 528 msedge.exe 528 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 528 msedge.exe 528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 528 wrote to memory of 2544 528 msedge.exe 82 PID 528 wrote to memory of 2544 528 msedge.exe 82 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 3480 528 msedge.exe 83 PID 528 wrote to memory of 2508 528 msedge.exe 84 PID 528 wrote to memory of 2508 528 msedge.exe 84 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85 PID 528 wrote to memory of 4524 528 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\eb6aa0d6c57fd543fe8edc6b3767f1dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8af5e46f8,0x7ff8af5e4708,0x7ff8af5e47182⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12684646348563553985,1412097495233313074,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,12684646348563553985,1412097495233313074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,12684646348563553985,1412097495233313074,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12684646348563553985,1412097495233313074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12684646348563553985,1412097495233313074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12684646348563553985,1412097495233313074,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
6KB
MD52e2eb45d80d0fa17168a7493b7a7ff96
SHA1602ae0c3fced468c47ac06a2572b3f5925866d9a
SHA25642a53f99870f4fd0d79bd7f55afb6b348855e4eac2877f49ffb46c9a54a81894
SHA51211e7f98dd9cf55cb0acf9f0ccd2c39b92366d64bd8938048713c28c41c6d8928b7f1862f4273133a6ddfd359d151dffd5510ea37ac0b11f0e1d9ab38c66a0ec9
-
Filesize
5KB
MD5de998e963b9d0b24d4bc34b1cc4c0ec6
SHA114c55ee8093906da07ad1e6dfb3660108f20c470
SHA2561f33625f2c6bfb8dbaadf8593126511d4c642754e6cd7bb870269d8714db7ce5
SHA5125fab146daf53bbd13c4f784e6354908bf3a98325e3b6983782b033f60093e01b89511f2e69e98b4189bdf25778d389dc63c083e18741271c49286cc2f260c45d
-
Filesize
10KB
MD5d50558a0e40ec2b370e6473bfe4bcf0b
SHA1c58debae84d0b01b446db5834fae5f54788331b3
SHA256ee7869a0ca16f79cc5443ed074e272855c8f10dd1cf610a32876f97ec62c63f7
SHA512caab451e0fa647a89149bd63781e3e7e1c01c66cd710219a72da36dbc074debbf2ff8ac4eeb4939ef6825f329100c3e61c28bb4b144c8215bf44d0ce4c6ed07d