Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
fdb35b218fc6bf36d3e13d16f58631fa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdb35b218fc6bf36d3e13d16f58631fa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdb35b218fc6bf36d3e13d16f58631fa_JaffaCakes118.html
-
Size
18KB
-
MD5
fdb35b218fc6bf36d3e13d16f58631fa
-
SHA1
f01cb35667ff4892482422a9f055d7b7f7cafb0b
-
SHA256
8b06053549e2c84b3c3937eea9cb6f6f2929a18c62874d0ae93cc943b09909fc
-
SHA512
341beca3e5a6b34475d48fa6b65b39225523c50b685f32583875c6eaf13385844fc492481e1c85d3fca5b2188b880004ab6ac0658ae6113ce9b127ea2d1ca14a
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI94/zUnjBhB782qDB8:SIMd0I5nvHJsvBgxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2368 msedge.exe 2368 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 804 2368 msedge.exe 82 PID 2368 wrote to memory of 804 2368 msedge.exe 82 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2336 2368 msedge.exe 83 PID 2368 wrote to memory of 2408 2368 msedge.exe 84 PID 2368 wrote to memory of 2408 2368 msedge.exe 84 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85 PID 2368 wrote to memory of 4960 2368 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fdb35b218fc6bf36d3e13d16f58631fa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd76d846f8,0x7ffd76d84708,0x7ffd76d847182⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,759922222574252874,8505266993165790531,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,759922222574252874,8505266993165790531,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,759922222574252874,8505266993165790531,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,759922222574252874,8505266993165790531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,759922222574252874,8505266993165790531,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,759922222574252874,8505266993165790531,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
6KB
MD52259925938196894df3cc162c956bdc4
SHA15688d05491335a4a23a5b02fd58af1c3de90b151
SHA2567384582b89283c38c1680b26ef58f96c216d132df759d01c3a228a768d8a66e9
SHA512d57bbf676eae1dd93b2cf9493c390ca4f26ad505ef70e7b7b6783c3b62894c71fad7c966e126ae95ab12148be9402a7d12f81d6e85efab17466c98f73aa2786b
-
Filesize
5KB
MD5282e9252fbe0606b37704f6356609cfb
SHA1c11cc53393012a7d55fac82f77ebfe133358007a
SHA256e8838a45a5272ea98f4a075cbad60640e5aad6bf1a9afe4f0b1838d7b968f2d1
SHA512d74da682b7f882c7466e9d9084e29f246de74778a0275b713a42506af1560ecf6d768373a8208c6997e8744aada36c5d597716d875d5778c4f122505761b6ab0
-
Filesize
6KB
MD53351cd96c5d416a0b28e86f24cf09ebf
SHA1b56be048527b3029d5e48da15dd55d642bae8591
SHA2565c1304d710e0336795e81255634818aaab750cef3d7b0eeab490a80c5b6822ff
SHA512c035c2cc9677bebaee2b7c8b825ad360d27e2053d13da3397b775803426d536ea49d38ccf5b3a931e0cac64ec39f4846f0e38b97efd96fa7aa9b2d6c3b29a9e3
-
Filesize
10KB
MD5df6540d8b6fecb4562a42d293bb2a0ca
SHA1a454d81dc436a8545d29e029445d5727f10a111a
SHA2567a77a620df72ee3b5b107f6c9a8bc8783b863053c42fa49447b9e6ca9b169202
SHA512c08cd008e9ec52bf7e19b2144445427d9a3db605299cc0d315738a61a56dfd311587c4503344f33840db05e617c0cc8b378a189c7b7603b32b9e0759ec9ea59d