Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
fd95e9b2cefa5bd2ac07c745f8b30624_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd95e9b2cefa5bd2ac07c745f8b30624_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd95e9b2cefa5bd2ac07c745f8b30624_JaffaCakes118.html
-
Size
139KB
-
MD5
fd95e9b2cefa5bd2ac07c745f8b30624
-
SHA1
fef2d8f13f77c805693444ce9954382579d04500
-
SHA256
c4f426caf47db5ace100448840d52fbdb6ac4b3995319c22710c06e5abf44504
-
SHA512
29caec29be248db1532f6773312a9075fa74ac0a7bb68cb35c836a3b9cbcb9e8bf0a03de8906e33e46acccd39883f580067eb160f6ec334f6b4d2fd4c6151de0
-
SSDEEP
1536:ShLqMdnlMTOyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:Sh7d4OyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1456 msedge.exe 1456 msedge.exe 4032 msedge.exe 4032 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe 3180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4440 4032 msedge.exe 82 PID 4032 wrote to memory of 4440 4032 msedge.exe 82 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 5008 4032 msedge.exe 83 PID 4032 wrote to memory of 1456 4032 msedge.exe 84 PID 4032 wrote to memory of 1456 4032 msedge.exe 84 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85 PID 4032 wrote to memory of 4156 4032 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fd95e9b2cefa5bd2ac07c745f8b30624_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb026546f8,0x7ffb02654708,0x7ffb026547182⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14421131431767378904,15719915842219309564,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14421131431767378904,15719915842219309564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14421131431767378904,15719915842219309564,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421131431767378904,15719915842219309564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14421131431767378904,15719915842219309564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14421131431767378904,15719915842219309564,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD5d3295269957780bd905233f8229b6de2
SHA1fc2dde47ee3d2573ad9c7361c34882dd1e1be32d
SHA256d847f762a36c10beb8307a3936edfbd6a7fa713d0bfc2087794e557cad52afc8
SHA51271516ff424132f94eee0c1f57d26a1f89a0c83361f276f6ac0f462244df5fcaad4298c506010834fda0b3327dd8ea2c31201821eb42826d7451da25cf0cf903a
-
Filesize
6KB
MD5dd3a16b8ea5aa679d8ae5a84a7dc8eed
SHA16a438b663ac3cbabe6f1705fe508065a23a4f33e
SHA2565d70d0a88994edea6f018494ef31b58f53c667221ca1e97e1e999a62cd939792
SHA512da906311bb2dec006560ffc300e7a77a52443f85a6d77827f22626b099c983da33e7372706bb6851af56dedbd9e5fc270fa7ca5c777d1efad0bb7c1acc9787ae
-
Filesize
10KB
MD5e04381a957ef2fe55acc2ec5e85924e4
SHA193e538080db0481f67313810d8ddc28c4e6431ee
SHA256387afba045e72cdf1359ee08d34bb690c440c34313b8face71027f491eda46f1
SHA512bf25cc64c991245c8ce6d750e0bea99bceb23840fccea7c0f7b4969f104224091693c95a6d57bf0ad9a670428bf5e683258b449ba28fabed1d81b2f53ab6c15a