Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
fc0ccb4fa6d2d4c84aff45b10b23495a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc0ccb4fa6d2d4c84aff45b10b23495a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc0ccb4fa6d2d4c84aff45b10b23495a_JaffaCakes118.html
-
Size
29KB
-
MD5
fc0ccb4fa6d2d4c84aff45b10b23495a
-
SHA1
b863b7ec71bbdb05edb16950a4b1915ccf250675
-
SHA256
7e438d166809f27efcbd2456172addfcbad1119a3d5e87b34766df87533b0c14
-
SHA512
490e59ef0696dd6730c812f96ed71c034b271be0dcded0d55ab07e0af398057e8a76b3b8aeb12d1cc6f559141591eb8f48d49e2b00bda0f2267ee1f4a08eecf0
-
SSDEEP
768:SRa1aIOIi8GAKyUyoerr3DMNuer6zR5OBR5O0ermjGy/hYeIUQsgVJ:Sabi8JXKerxer6oerjRVJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1760 msedge.exe 1760 msedge.exe 688 msedge.exe 688 msedge.exe 688 msedge.exe 688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1760 msedge.exe 1760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 4980 1760 msedge.exe 82 PID 1760 wrote to memory of 4980 1760 msedge.exe 82 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 4576 1760 msedge.exe 83 PID 1760 wrote to memory of 1192 1760 msedge.exe 84 PID 1760 wrote to memory of 1192 1760 msedge.exe 84 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85 PID 1760 wrote to memory of 224 1760 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc0ccb4fa6d2d4c84aff45b10b23495a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d6646f8,0x7ff84d664708,0x7ff84d6647182⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,15930560518052301929,6020625388648052342,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,15930560518052301929,6020625388648052342,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,15930560518052301929,6020625388648052342,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,15930560518052301929,6020625388648052342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,15930560518052301929,6020625388648052342,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,15930560518052301929,6020625388648052342,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD58daa974cae45cd4957c9c5634743ab4b
SHA170bb92eeeadb5af7667082b75e9fe6b3046f6821
SHA256193afcf60e34839b98b8ca927aa3a2a597b84430e7c9d7af73244b33539925d2
SHA51213f50c886ddbad814cd6639f0eda9c8a0a8b93d9ff60e942fa4205bec7e9ceea548d8d0f3ceebd1246d05db52eefb0c865a0720845d6c4dac53066c582c0406c
-
Filesize
5KB
MD5b30425abb5b82d8b38cacf6889185931
SHA19ba854b736c55ae50bf72459b99aaec6cc77e109
SHA2569c871a0df4547ddeac7b8a5beb98a8cc1fb031026cf7902ef3d856b6063dbfb1
SHA512390859b719b915826121dc0f3072a8c01c016a68c5f36dc3ff4581db28aafc70c47c8ac0ed329ff1651080afa1e1592b0fd0e5c97a9d50e79f3b27405069a17c
-
Filesize
6KB
MD5fe35c9f98871676550b8e16f919955db
SHA190ab761f6637c12a22abb98ef91e628be4f78c12
SHA256c09612f9067913c8372f2961072826c508b0dc65d76a21865ebbae4d60d158da
SHA512261af42250aa1ae806ecdff4f99a96927c6c9bf56b55a5f85510da6016209a715ce90b8ca1e7a958c50ba6e39d5674f13fae7f1fdb7882ec3d50d7369dddf030
-
Filesize
10KB
MD5a51e54420b1f8214e373385d6028f0ca
SHA1987ede3d3e630888b143ab3bdae7955c7eedfba7
SHA2560c9665e1604b2e24ff490b299631f9484ecccf6e725e2b109a97333f3fb98033
SHA51208d1307f469c5858f69da051874cb3820fa87ac8e8946e1cf848acb55bc936fb4b6502fa7607857f732a5d7d966567feac3498542d826f5253c0c50408279263