Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
f0ce8ccf7515ae27a1911ab82be0bc3a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0ce8ccf7515ae27a1911ab82be0bc3a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0ce8ccf7515ae27a1911ab82be0bc3a_JaffaCakes118.html
-
Size
139KB
-
MD5
f0ce8ccf7515ae27a1911ab82be0bc3a
-
SHA1
8628a2bfb650d06ff7a56a00ebddf053b8cdb714
-
SHA256
913d9cf8a8e946e399ece82bf2ce941c174745399c88c171b3715c031b24725c
-
SHA512
65ed9722a16e1d613254120ed171f35b2770e5a8e8b3975856dcdb243df28859092a9ad7f0c01db7f40263edf802ea26b5201f55f1aa5c039c561a159ef68a4d
-
SSDEEP
1536:SfT5SHDl1oKyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:Sf/KyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 2800 msedge.exe 2800 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3052 2800 msedge.exe 81 PID 2800 wrote to memory of 3052 2800 msedge.exe 81 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 1828 2800 msedge.exe 82 PID 2800 wrote to memory of 5032 2800 msedge.exe 83 PID 2800 wrote to memory of 5032 2800 msedge.exe 83 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84 PID 2800 wrote to memory of 1144 2800 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f0ce8ccf7515ae27a1911ab82be0bc3a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc136f46f8,0x7ffc136f4708,0x7ffc136f47182⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4251794091964478848,1270127756711999911,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,4251794091964478848,1270127756711999911,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,4251794091964478848,1270127756711999911,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4251794091964478848,1270127756711999911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4251794091964478848,1270127756711999911,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4251794091964478848,1270127756711999911,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5fc2bc13aa6c496f83b76d6a1f9a226af
SHA1f0dcc2ddc1af2ccab06eb7105f4c0aa26880d736
SHA256d2eaac70f4de2bbdf79dd5354442e57ddd39c078d8b592923b8d9553550812e7
SHA5124327f8426943046bdd3f8aa6676d1eaf89478511897a9e68822c49437784eadcd6312d295351bca9e9807ddbc1db3e5fe5ec61f6222d07b06cbf2c6a4dcd9d78
-
Filesize
6KB
MD501c457723cb65f30ec45917f4e42ea26
SHA1a6c7962fe7337ababc868043d0b03eb86b23b3ce
SHA25660096da323c0ba8afdce8014311e5fa79dd32243a66633b0e08d3605c5242b7b
SHA512aa4016f0e74ad04c36d048d96135a27a1639d63b922c0347110317dbc238a344d304d9f164187d297c561ae4672bf4a28af2babca628e2b753a8219589a487f5
-
Filesize
10KB
MD5c8b2d0579a0900f1b66fa314a630ac53
SHA1ade7e6bb9cc9a7744ece6d2bd12486083070f045
SHA256dd9ed58ac880bac3a4900fc84968e7e23dcac5676d4bfa5d201ae35afa974fa9
SHA5129655249cb5262d821ba4da807841e15686c7691517eed428a8b5c6894032cea7eeb3d2332470dc730909c52fe373ebafc9281536cc32bc1aad60b846af89ced1