Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
ec0894f251a18d3174119badf6c52763_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ec0894f251a18d3174119badf6c52763_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ec0894f251a18d3174119badf6c52763_JaffaCakes118.html
-
Size
157KB
-
MD5
ec0894f251a18d3174119badf6c52763
-
SHA1
a4d2ac999e3f28d97e71be622c9482030b5bb0a1
-
SHA256
43f58c35af8de003f183a28a47660c3eec84a838ec74dd6652e8b1e92d79de1e
-
SHA512
432397709dee3be59f6d71d5ae7b7ec6be7acc63f924ada24c7e56349bc4db3d626588b8790a479f26c0ad2d1d8213f30db3f6dbd7adbb9deedffcf31b05e07a
-
SSDEEP
3072:S20nTTqMB3yfkMY+BES09JXAnyrZalI+YQ:S20JCsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 5064 msedge.exe 5064 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe 4452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 1668 5064 msedge.exe 82 PID 5064 wrote to memory of 1668 5064 msedge.exe 82 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 1564 5064 msedge.exe 83 PID 5064 wrote to memory of 3476 5064 msedge.exe 84 PID 5064 wrote to memory of 3476 5064 msedge.exe 84 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85 PID 5064 wrote to memory of 2372 5064 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ec0894f251a18d3174119badf6c52763_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9991f46f8,0x7ff9991f4708,0x7ff9991f47182⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10615093812461179801,5686840369295520636,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10615093812461179801,5686840369295520636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10615093812461179801,5686840369295520636,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10615093812461179801,5686840369295520636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10615093812461179801,5686840369295520636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10615093812461179801,5686840369295520636,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5e58bd1e5727f6ccf24a8b2d5ce1e15c7
SHA11879073cc79b26eeb1d0bed349681f8b0b23f3c5
SHA256004f2795fd65c6fda0800d3d313fd509ba9c81d5cc24d0b77d1c9a6e7eea09ee
SHA51266e4a1a9e969d8495a4ec3cef4675d8eaa7c439d059e95bef1a4ce2cff75ce2ab41002382e4c614589bd372bdd968469f4068bf8bf200c91e97569671a544846
-
Filesize
6KB
MD57cc216ea7848c3c01cc5fb77abdee79c
SHA17c2b16a849b8775d899857a150ef371b4d8ac37b
SHA2560b0c1fe9242a3f43c01b9a17c0574d2f8b0c3829eeda81df4a1ea80ba9c01a60
SHA512075bdee4dabfcc5bf8cca2ebebd9154b5019c7d23a4d69a57186d4b8ad9e556b1279f14b253f21ceaa263a3f8c940ec3a24ef2e1fa35c13e103358c3f3f424c3
-
Filesize
10KB
MD52148acb795a9c19483c315187a84ea7c
SHA1df4b4eff932eb874c1e7424c4a5bb846864422ef
SHA2567c84af34cf9fd52f76646b9491880fd5697a6172fd16a4e2e014f00ce0e20f5e
SHA512d706bcfc4f875e153c73c14c981f88ab2dbe63288a97ddc8c7b1509c4a79100d2c660ba56bf809bf67fe63d15875f2104f388044a187ac09b5d2f92010a6330c