Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
0b26baee46747ed63d967664e61f038c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b26baee46747ed63d967664e61f038c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b26baee46747ed63d967664e61f038c_JaffaCakes118.html
-
Size
139KB
-
MD5
0b26baee46747ed63d967664e61f038c
-
SHA1
c9663f2e616d9c542fef5e87f688f9c028e3d76c
-
SHA256
91315142a45e686be5f5e1b9fe0457e95bba69cc94977ecd0a353f3ed2287a04
-
SHA512
813ae6d2811243759bfeaa0ea937bad527e7f020266d13f1acb0368f0e2c596a392acdd4d7219a124ef07243c801e0b8092e27e97d340c09aebb862f8bca2eb3
-
SSDEEP
1536:S4+vR1tqOTXrysqhY0oe0Xnl8orfyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76Eu:S4+zLyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3244 msedge.exe 3244 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 2360 3244 msedge.exe 82 PID 3244 wrote to memory of 2360 3244 msedge.exe 82 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 436 3244 msedge.exe 83 PID 3244 wrote to memory of 3572 3244 msedge.exe 84 PID 3244 wrote to memory of 3572 3244 msedge.exe 84 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85 PID 3244 wrote to memory of 1032 3244 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0b26baee46747ed63d967664e61f038c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc109f46f8,0x7ffc109f4708,0x7ffc109f47182⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4075426838623335023,17935499483015944845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4075426838623335023,17935499483015944845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4075426838623335023,17935499483015944845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4075426838623335023,17935499483015944845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4075426838623335023,17935499483015944845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4075426838623335023,17935499483015944845,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\94e09326-8241-4401-8e26-c4baea1026b5.tmp
Filesize5KB
MD571a42cddc7765d2b9d7f0630380edb07
SHA118193adb585a8643fe68596d2aac18e5904f5446
SHA2569a09492f2bf50bdf917d67c6413eaadaf3e42d430baafc797c3f295ef4cf1dac
SHA5129ca9677211869a88ea527020679134e0a64ad0a7e3513f4c0c9070cb58fa3d2274782dfad32e2051e153d442380fc3b4cecd44efc30b2a2a9b3b4abf8cb09e5b
-
Filesize
477B
MD52c4bc11eea040b79b1df8183f98a25e0
SHA121da02b58b473bb63d6bc59f4b101e03fcc355cd
SHA2560187ab4a1c6e87f70daa503944d3ce29288b5f804eb672524acb1cd18f4f39aa
SHA512e2f9863126fa8ed5f744744f837adda01b11808c85d01d2246620fee2593aec690d5b5f2df61e3c83f696658bd99210be802bce9e99fd88baef3daccbaaf8f53
-
Filesize
6KB
MD514b2651d67e74469d4ea0a1bfd8d12a0
SHA18ea0dbaeded8a5971387df3954610bb027546ed2
SHA2562b1a8f4bbe6e011ce53861fa96f4b097dc476fec4f92477d70e3cb89792def71
SHA512501e03d3b359cee2dbdc1a41073ea8670023859ce920f3b4a97145f9556ba5118d6ab372af712312882588ea444822710ebc4c8aa90715b0ed542155f46ed328
-
Filesize
10KB
MD5d4d1c38635aa54d45b9b2bc838be09e8
SHA1c8991702e7600c4e3fb9a821170e0d9b1d3e1900
SHA2560d90fc12159cdb7367e1298f8420633fdbcc00b84cc745c337d71bc84c15942a
SHA5127fe83449c725d5553fa80de6ad853a947b880bd4f9edb618f5f1c8f48957c36742b085ad13b0789dae9ba657f5700e38e8cc3fec3cf0c96bddf17b351603b5d4