Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
fc52b6a9703f2d4f9ce56e657856d527_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fc52b6a9703f2d4f9ce56e657856d527_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fc52b6a9703f2d4f9ce56e657856d527_JaffaCakes118.html
-
Size
453KB
-
MD5
fc52b6a9703f2d4f9ce56e657856d527
-
SHA1
a0facfd595273ce9732764ad3949be3ca463b6c1
-
SHA256
e811e8c42d3071e0c16240e07f9a4105eb8af1a83a71a1ea7b4a9d77f1901332
-
SHA512
58679fdc9908115dc5624128456088bc4294cdec0989a10370a7e1fd0cb230158e2e4583f8729d43647a2ce176a8983c770e06479e634b14f154ccf96289e619
-
SSDEEP
6144:SnsMYod+X3oI+YIsMYod+X3oI+Y8sMYod+X3oI+YCCsMYod+X3oI+YQ:65d+X305d+X3E5d+X3x5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 3932 msedge.exe 3932 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3932 wrote to memory of 2400 3932 msedge.exe 84 PID 3932 wrote to memory of 2400 3932 msedge.exe 84 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 2192 3932 msedge.exe 85 PID 3932 wrote to memory of 4644 3932 msedge.exe 86 PID 3932 wrote to memory of 4644 3932 msedge.exe 86 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87 PID 3932 wrote to memory of 2996 3932 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc52b6a9703f2d4f9ce56e657856d527_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97b3246f8,0x7ff97b324708,0x7ff97b3247182⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5536478661430112591,13600518664064780723,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,5536478661430112591,13600518664064780723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,5536478661430112591,13600518664064780723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5536478661430112591,13600518664064780723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5536478661430112591,13600518664064780723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5536478661430112591,13600518664064780723,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
5KB
MD57a74297d41e07cc93c3c227d27b0509c
SHA1ff059a81f827d0432c1bd51bb845da5cce8f24bf
SHA2562cbd1f7dea0896c665961bdcf244f8f72a7e0bf4be2d3869e835d0ad2d6cb143
SHA5128a3d4bb450bd91116afaefb71a4be64ca3ceeefa216b1c320e61dafe57e3665fb2892ae9d8b4446d7283f32bebdd4345cd57f361a7ec7ec7359f6d941988ef13
-
Filesize
6KB
MD5a2c6ee27c3048a3f6aafa4f7c0c667a8
SHA11f2a0029a543944c89ba6aef7ae440d5466f9d62
SHA256877ccf693e4df9bd8bea18fa8b792a90a27199d1ac4290792d3a3136276db41a
SHA5125d5ab38cc0b8f6ae2c376e2a43a8c2c2e12a2120dbfefd234d26e7692d9f6cae4ce4e128dfd8bc5bf4f76fdba7f70c599a2514ee19c15e136244dd740c7e5882
-
Filesize
10KB
MD51fca37c24951bf19b8e47835c39dcbdd
SHA136142548d1f9a58fdb1dc7d23aa7f97448f09d06
SHA256d72dd1fe185d19604155c68969e03490e6fe93e60bdb33af9e6d57ceb7fea1b0
SHA512d741ab0a9288b09a6a5d8fad05d119c57cfeaa078ae641e560586dfa17b513e3db243aefe3fa0b67fc796fd85a51bbaa9126cb2a790878bf3af53aee1fa81220