Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
2a67ad5e5f8ea26ec43058ed4e69b76b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2a67ad5e5f8ea26ec43058ed4e69b76b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a67ad5e5f8ea26ec43058ed4e69b76b_JaffaCakes118.html
-
Size
139KB
-
MD5
2a67ad5e5f8ea26ec43058ed4e69b76b
-
SHA1
ed26b6a0bce7bc86d3ae0cf7dec892c9111d55db
-
SHA256
2340f2072aa1a20ad35245036321cfd7066be8fd52401ec677c1252069a6781f
-
SHA512
b937c9d0f0d9aceaf27a3bd342418ef664d31ce47d8f9739c590bd3b437890303efd319068baed55019c9c95fd75db43e492c274d5932d4bc6cca584ce93fec2
-
SSDEEP
1536:SoRpS7qlWVyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:Soi7tVyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 888 msedge.exe 888 msedge.exe 2800 msedge.exe 2800 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe 2800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 1304 2800 msedge.exe 83 PID 2800 wrote to memory of 1304 2800 msedge.exe 83 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 4312 2800 msedge.exe 84 PID 2800 wrote to memory of 888 2800 msedge.exe 85 PID 2800 wrote to memory of 888 2800 msedge.exe 85 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86 PID 2800 wrote to memory of 4760 2800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a67ad5e5f8ea26ec43058ed4e69b76b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa82b646f8,0x7ffa82b64708,0x7ffa82b647182⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17700459057573486837,14473607992924817682,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,17700459057573486837,14473607992924817682,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,17700459057573486837,14473607992924817682,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17700459057573486837,14473607992924817682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17700459057573486837,14473607992924817682,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17700459057573486837,14473607992924817682,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD54b707dcca918e9cb138d843edfbd8c30
SHA15ce42d3b0f488abb7fbc6d45cc47bfe30f271fe2
SHA256ca37bc0443c63f79edbb5347de071fee632f8cf49786845d3d0f3835be463602
SHA512f8445a471e48c757aac818ded16126f0ad3c8f800cc7fc9f45fdc4ab7f440a605cb468a6f259721cf528b40359f44ff04350c3dea7f960e88edbd64e09642cd0
-
Filesize
6KB
MD5b7a8ea75a9b1b47a4ac0d8dc025a0dbc
SHA15d7d12987b1838ca26dcc65c3a410d4e8af86ada
SHA2568a9a31a271df5d8f4930476bcf4830efee9bbfd5226c2cdf920e6350f7c12580
SHA5127d4117416f0c9e656163e27e621890ab80673472986fc9c37602925ec254de0a23c302f9fef02e9c73ec479f82db976ed94cc8b1fb304796040377d00a97ef1e
-
Filesize
10KB
MD5fe1d0d5a3be668ee84a045757a4884a8
SHA109760d52afcbec9b3d69fed5bfe23a92946d9887
SHA2567b6d1a3b06012070c02e544cb22539ea5ac347692fbd149da5e7fab91e0361ec
SHA51271565b516c654dd639ba20905503202199d3f8677786dfac6d6280348115172adea943e2e2a540bb70bfd0d1158d31ba2cf8c7f1300485cc898bc4ad84f2a268