Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
054b34f1ff3033aa98b00e543a1dd9bf_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
054b34f1ff3033aa98b00e543a1dd9bf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
054b34f1ff3033aa98b00e543a1dd9bf_JaffaCakes118.html
-
Size
139KB
-
MD5
054b34f1ff3033aa98b00e543a1dd9bf
-
SHA1
8ce0cb372164a9fd2d6b3761683a01dd24459145
-
SHA256
b2d3f9f07772abbbb23699b96473a215e616f32c11f1e148242c022ce2541cb4
-
SHA512
8b28fe25ae68cb62945e57dc6d312609db6ff01c4c7bc33eafb1e87954c6b4b03df3a6d9a330051a8c992757b37ef8c49b06f237d0ce624e47e2bd946810d4e1
-
SSDEEP
1536:SMNMeDBZtyCnEOrDlUZtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SMDgyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5048 msedge.exe 5048 msedge.exe 4952 msedge.exe 4952 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4404 4952 msedge.exe 82 PID 4952 wrote to memory of 4404 4952 msedge.exe 82 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 1240 4952 msedge.exe 83 PID 4952 wrote to memory of 5048 4952 msedge.exe 84 PID 4952 wrote to memory of 5048 4952 msedge.exe 84 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85 PID 4952 wrote to memory of 2728 4952 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\054b34f1ff3033aa98b00e543a1dd9bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7b6546f8,0x7ffa7b654708,0x7ffa7b6547182⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16715735480068167717,771463032821968724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16715735480068167717,771463032821968724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16715735480068167717,771463032821968724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16715735480068167717,771463032821968724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16715735480068167717,771463032821968724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16715735480068167717,771463032821968724,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2332 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD58bd4285b5b54cd8ac7c737e2a6be5790
SHA10c77440bb1c2e597af71ad87dfa970f9f608c22b
SHA2568d92b700cc3409612742aab3e1f3cb2c37ed74fffb307133e7cc439e6bb98dd3
SHA512f3a9d8df72d36dbaa48dd4d10f1f106a97dbe788e6d808f4e4af5e59f18ad616c59a1936c60b8c5918f895a15f684b7bc622654c2ebb10a2d94493736037e912
-
Filesize
6KB
MD5da3a9a53fc67cc6cbc6ba51a00f89b8b
SHA16a5b0dd359dfefdee3de2cc91d0b97a09161c34e
SHA256722f9fb82d597a5bc9f848bc4b3d80bc531dab16b4e0e6aceab1d5b54e340c6e
SHA5122c10ac0be8a907b4c43ff9786ae0cc9d39eb92660f3b8075318ef471440782a3010523fa4eea06be689036dedcf506913310b14261f57822c04abc03bc5d86c0
-
Filesize
10KB
MD593d423ed4a84b9bd51d399ead2a313f9
SHA1049b7b6b82d350e7a9686535b2cbb5e70704616b
SHA256b54c8cb2cb0a9ed09aba84f73ad3b98d22b4104a90fac366744afdd16086f63f
SHA512eb0b369386a86092fd3fa8c6c7b6784ff270b0a48d184fc4129048567898bb59d48e4f8251ec3f2fa4576bfe601ef8d2b0db6394c20015d8a4978df5c0652dc9