Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
17f7c516fcf4c5e0cf933035498e1c5b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
17f7c516fcf4c5e0cf933035498e1c5b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
17f7c516fcf4c5e0cf933035498e1c5b_JaffaCakes118.html
-
Size
139KB
-
MD5
17f7c516fcf4c5e0cf933035498e1c5b
-
SHA1
d06afb5447c965a69343c206fa1479ddb2ded4b7
-
SHA256
1cd4864838e46d85294e6a864d9cce154c79e755ece1cfed9b18468471bea7f4
-
SHA512
c7689de49bb7eafda38bae8f94f8c28bb17e6d987133a8dc466c5b9974aaa7486b735b0f109178572e6d9fb7a2c144e0b8d03ac088f4c3a3d4c1dfe562c49eeb
-
SSDEEP
1536:SPKhTbyMEmJgGbg1g3lbYGyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:SPKfYGyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 60 msedge.exe 60 msedge.exe 4340 msedge.exe 4340 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe 4340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4340 wrote to memory of 4296 4340 msedge.exe 82 PID 4340 wrote to memory of 4296 4340 msedge.exe 82 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 4728 4340 msedge.exe 83 PID 4340 wrote to memory of 60 4340 msedge.exe 84 PID 4340 wrote to memory of 60 4340 msedge.exe 84 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85 PID 4340 wrote to memory of 4068 4340 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\17f7c516fcf4c5e0cf933035498e1c5b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff51c846f8,0x7fff51c84708,0x7fff51c847182⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12034565313772684982,4079006725334084010,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,12034565313772684982,4079006725334084010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,12034565313772684982,4079006725334084010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12034565313772684982,4079006725334084010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12034565313772684982,4079006725334084010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12034565313772684982,4079006725334084010,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5e39eada553a68964b0eac6d623c981ca
SHA117438a5462f2e117edd470d8561dcc80ffd19dd5
SHA256b8bc0c7e19c01240ca0c4d544d10e4e141af75d91a7bcf94afa432768b145975
SHA51256269b0402beddcf121274227e02ffd0818a5babc4d629168c1fb77662beb78f06a9e70e2218f36078aa054f14dc02bd348dacf476aa41f07fcf43a722605b68
-
Filesize
6KB
MD5a60ab53a3e928062c6fc1ac3e66eb667
SHA163f27b9630f0c9c0fb48a51570e46057fecc7639
SHA256fde4444e27af3f1673a22ae21bee6c0db634ecf7b65fa39e86a76aff676e44fa
SHA512617d45971c705ddfe75fe10b947062ccf68d4c5cdda4d8f00729c87954c3c511c4072710358059039fd2816b7a8ee21fdf498da9b6d0b8e3374dbec007312149
-
Filesize
10KB
MD535f1718f295165f1be724673d2b2239c
SHA1c99b4869e1dd1d4acaf292e96834b2f989fb9f0d
SHA256d4af24809dd53d61503664a4b8aa0bd7f243335d8e705a622fdcfb8911a47907
SHA512e347d645c8712cbcf9a37acd9197ad7d7275d925b1a0b4caed3f752fadc3894682c02c1617b1748d55eb1665f5b2b9baf723cabf6fb8dc248fce4847f49870b8