Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
f66c6800bd4a6a1cfdb3e50113482714_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f66c6800bd4a6a1cfdb3e50113482714_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f66c6800bd4a6a1cfdb3e50113482714_JaffaCakes118.html
-
Size
226KB
-
MD5
f66c6800bd4a6a1cfdb3e50113482714
-
SHA1
b4f7691e42d19c1127cb679a4c699d5db041c9b8
-
SHA256
0a68f3943461fa52e0fd3293711cd8ca263b69c231b6bc9f525169644359920d
-
SHA512
c5829dd7bc2bdd66c1d3fd3c9539653c6421699e8b6532b5114ac488ffb06cc97a7d54edc0cbda64d8e6db3549ccc798aef5e7dcc52d66de180c94c197b1e128
-
SSDEEP
3072:S4CrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJRQm:S4Kz9VxLY7iAVLTBQJl5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3584 msedge.exe 3584 msedge.exe 4396 msedge.exe 4396 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe 4396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4396 wrote to memory of 4488 4396 msedge.exe 81 PID 4396 wrote to memory of 4488 4396 msedge.exe 81 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 4848 4396 msedge.exe 82 PID 4396 wrote to memory of 3584 4396 msedge.exe 83 PID 4396 wrote to memory of 3584 4396 msedge.exe 83 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84 PID 4396 wrote to memory of 464 4396 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f66c6800bd4a6a1cfdb3e50113482714_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd183e46f8,0x7ffd183e4708,0x7ffd183e47182⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7386599634038588540,2285427783092687801,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,7386599634038588540,2285427783092687801,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,7386599634038588540,2285427783092687801,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7386599634038588540,2285427783092687801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,7386599634038588540,2285427783092687801,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,7386599634038588540,2285427783092687801,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3636 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD55ec84e884c6df268a02ecb9389c10c41
SHA16c42b4a5d34a1dfa684a21e88633c398499a2580
SHA25672755f7dde47768d87bc2323906e2385387a858995e25fcf583efa694d3c2d4f
SHA512f01f1454115abab0f436c65cd58f85bf312e646eaa403027f735edd6dc2ba357bafcaa3af3235151e1ce2a6b2e2cef50786721cb28c0b54147ae612995efc559
-
Filesize
6KB
MD58fb7f5f65844c66e18d63d160cb7f241
SHA1c6b6652686d9807ba8dd2ef5e747987668538829
SHA2561fe614d68f5d158cb4c8654b1178b9ec25ecca42fec4a36b51a5e9351a6de623
SHA5121c3d87aa7786ed4620e4d1f8d4b7c84db17a160dbf8527cb8b5ae48b0c6c21074483254b8fea7cbd3301b25b831066e461900a47d3fcdc1b70ff39c606fabb19
-
Filesize
10KB
MD55559916b2d1b12a6c8da2eb144990e0a
SHA1af4711c9cfd32d27e74ac7d82db3ad5ab6f8bee1
SHA2561112082c7dd3e0fb6e95394b8cfe15481bdd4d8c0c3e52db511ec3c45a6fd7aa
SHA512e3dbf336035e9f7738e49eba70a570f75803a03e8a838875223c64a8828fcfc222e8233c5e0c823b95192a4da8c933b74c0d358c39d91d944b0f467cadf3c341