Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
fa411dcd69c7cf01941f27098794dc31_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa411dcd69c7cf01941f27098794dc31_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa411dcd69c7cf01941f27098794dc31_JaffaCakes118.html
-
Size
213KB
-
MD5
fa411dcd69c7cf01941f27098794dc31
-
SHA1
289d9b9d87ff1c9fbb3a5722722c142b6522f723
-
SHA256
78f792f045946786c1824b8ad28dd894df77b9258a54d92a25dd5165882936eb
-
SHA512
9b62e3128836e683b7995e7834a3155ff2d850aa82f2b6da7a34bc3eafd569acbe74ea7ebb654b779950a75f4817324887bc8c90a7f9c1a2e2f83dfb9a32ad2d
-
SSDEEP
3072:S4YOeqMz/8TX6yfkMY+BES09JXAnyrZalI+YQ:S4NhfsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 392 msedge.exe 392 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 392 msedge.exe 392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 4136 392 msedge.exe 81 PID 392 wrote to memory of 4136 392 msedge.exe 81 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3948 392 msedge.exe 82 PID 392 wrote to memory of 3224 392 msedge.exe 83 PID 392 wrote to memory of 3224 392 msedge.exe 83 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84 PID 392 wrote to memory of 880 392 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fa411dcd69c7cf01941f27098794dc31_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6b6646f8,0x7fff6b664708,0x7fff6b6647182⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9233680377378274510,6979125925874780704,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,9233680377378274510,6979125925874780704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,9233680377378274510,6979125925874780704,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9233680377378274510,6979125925874780704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9233680377378274510,6979125925874780704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9233680377378274510,6979125925874780704,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
6KB
MD5acc4e45c59f72920e01e2d3cac56e07d
SHA174cfb374d1679f39eb622ff9445fec8bf3404769
SHA256c5aa01784149dbfdc342cae0459563c61324b869fd87b1cc505617fb32ab7e93
SHA51226f12c97c6173c939172246ab6f7f63e6346b10e25afb20daef060e262cc146506bc127ab8eda72044170337e7f032b79170c7777e12d74f498143639a02c290
-
Filesize
5KB
MD533e1db1624849324144eac328172a87f
SHA192bd85b4ab93ea497eeeb93d43063b848eec1242
SHA25696f2642edac52d6bd2e9c3c08e402d89771ef2a9e0ad0865972606fdfe511a30
SHA5129d323c3a8d79a093eb160b6c9b25caaa1e35d816d02853d2ab3d6fc69066b48111a923ed4858d54a634392a18c4e01d2b5633e97df88b878bcdef8ce1af344f0
-
Filesize
10KB
MD538718f0d8a9dcfb8d9da389ab785deda
SHA1f4675fc06d44c476625a116852d65c5985b26fd2
SHA256917ad63e71480ebd94813d346aea692de7f284ce4f929ca903bbfb6ae1a0ab7e
SHA51228cda442efd5f370777048585722ce377ee5eb9dee1a00efd36bae5bc4963e72a9ad8d2722732c383debf72ebfc85f263c822a864bbf568d54857a812f751ba0