Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 14:06

General

  • Target

    0f1035c34402ba11bcad4b758b076233_JaffaCakes118.html

  • Size

    458KB

  • MD5

    0f1035c34402ba11bcad4b758b076233

  • SHA1

    30f34c740f161b813e0442cb6ac577043fcfdce5

  • SHA256

    bf9b0cdf6ec5521fd98fa82ac804a8581448595f23d3d29979eafdcd532fdc8e

  • SHA512

    65103399d56f76c42327eccb5dcb3dbb0f51f0f4386d2a0f682298882b9074837c441b7d2a41079c370ed2f52e6ef728e21ba2c02559579964e3cc87829343e3

  • SSDEEP

    6144:NsMYod+X3oI+YtsMYod+X3oI+Y7UwsMYod+X3oI+YMsMYod+X3oI+YQ:Z5d+X3j5d+X36e5d+X3g5d+X3+

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0f1035c34402ba11bcad4b758b076233_JaffaCakes118.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7fff77ca46f8,0x7fff77ca4708,0x7fff77ca4718
      2⤵
        PID:1940
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,10642580044265915904,16001678916356334519,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
        2⤵
          PID:1768
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,10642580044265915904,16001678916356334519,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2856 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4684
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,10642580044265915904,16001678916356334519,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:8
          2⤵
            PID:376
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10642580044265915904,16001678916356334519,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
            2⤵
              PID:1392
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,10642580044265915904,16001678916356334519,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
              2⤵
                PID:2756
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,10642580044265915904,16001678916356334519,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:2
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2644
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:3376
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:2304

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  9b008261dda31857d68792b46af6dd6d

                  SHA1

                  e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3

                  SHA256

                  9ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da

                  SHA512

                  78853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  0446fcdd21b016db1f468971fb82a488

                  SHA1

                  726b91562bb75f80981f381e3c69d7d832c87c9d

                  SHA256

                  62c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222

                  SHA512

                  1df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                  Filesize

                  182B

                  MD5

                  b9256fb921ef6ffb6131fa6eafd3ca58

                  SHA1

                  66549c814906ebcbb83925ba952c6f06e6900c02

                  SHA256

                  4c28719140d8349b1d8a3579c60edad4b0e2364e1061a6b9c725c5d5b6d9bd1e

                  SHA512

                  1f3aab0f6395dab708a92316351dde8690be360e2344616c4c568510709fdeb53542bf684b7e88e60b89a251341074cc595965b69038a46f8b54317243dc3ca5

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  5KB

                  MD5

                  e0d5c9e5de45597ad7082ba0fa0ddb1b

                  SHA1

                  1e51c4c5a6cd0f1aad7630ad534243bd3cfa6ee4

                  SHA256

                  4a4803db1719af0d4e14e5935c57e42a864705afa4848813ab7e739d2ad69325

                  SHA512

                  c3d19a64e52bdf2f45c5205868e9817344dcec0964e29312b6784a9f10c73228488f07529ee00781165ffa7db3f8b76a0200cf0b234eac64f2c31bb1a6d78278

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  59d2006e52c034cf6f61e0684a4c8ffb

                  SHA1

                  f273048369b565eed06aa8984fed9fc677e21ab6

                  SHA256

                  f6b3522a55d10003e437bb0ba22a392a0c0a68d7a88bb15655cfbe0466c97873

                  SHA512

                  f58281dacd7435214db2155dd463423318c9640d2f1a349ec12d356fe2252519eabdd8030a689724a23ce599d0fca3f79fbaa915079145922633ed1a84b109f7

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  10KB

                  MD5

                  58c62b2b3bb6871aeb7c814fa5229991

                  SHA1

                  d01ac357b55f9e2c487f99ce9fe8ee3b104c1772

                  SHA256

                  4a3999bcf2c1fd06dffe5c9a9e7c5edc19990059d9476fbb84d68f5a7df55d59

                  SHA512

                  a550d55ec8f5ebebc0b86eb9e0ba7b550a67a2f618f99ceb7e40e4a8c9b86f3c042d38e8943e0f0a8942d8bf0018fc42c4ee8ad260dd3c9e4deff73123ff66da