Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
388e3dc51bb49f012bee552ada6526fd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
388e3dc51bb49f012bee552ada6526fd_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
388e3dc51bb49f012bee552ada6526fd_JaffaCakes118.html
-
Size
139KB
-
MD5
388e3dc51bb49f012bee552ada6526fd
-
SHA1
f199eeab2109d9e3a7b9f994e492b1718939ed30
-
SHA256
af2dd6c5b5f4d9f44f9775e5e3fbae9dba0432aa6d17f52d95364a43facb2b13
-
SHA512
fa1b6f596b686e0e978eaa78afa89e1cffea8dba51c5209b19b291b0e508697aedde888a1b69a7dfca60313b0c50325b94c93380b692bde6acf50b8005741168
-
SSDEEP
1536:SENZKFCokPjPLy5lxSTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SEpy8TyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 548 msedge.exe 548 msedge.exe 1600 msedge.exe 1600 msedge.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe 1600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2744 1600 msedge.exe 83 PID 1600 wrote to memory of 2744 1600 msedge.exe 83 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 3548 1600 msedge.exe 84 PID 1600 wrote to memory of 548 1600 msedge.exe 85 PID 1600 wrote to memory of 548 1600 msedge.exe 85 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86 PID 1600 wrote to memory of 1008 1600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\388e3dc51bb49f012bee552ada6526fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd875a46f8,0x7ffd875a4708,0x7ffd875a47182⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,9081436711961451753,8798322096601736747,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,9081436711961451753,8798322096601736747,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,9081436711961451753,8798322096601736747,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9081436711961451753,8798322096601736747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,9081436711961451753,8798322096601736747,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,9081436711961451753,8798322096601736747,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD574af05462c302e4a9274b56726ef8bba
SHA136590f76b2d88439d815dfdfdfd0ddbc1bf437ef
SHA256f733c8b9bf4e41d0bb88f7e92f567a6a6a79c3af57fd20dab40e48bcfe217b46
SHA512b1a7f5ff764a6439db7f549022bb20a36359afcb9051612ad073556d38f9f628673b35ae3d1d6e3e4f04324e6aed4675e45bb293b4c3784a42be5c2ca0cc3a3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e5add909-a8a8-487d-8b82-8cb8f1b2cc17.tmp
Filesize6KB
MD5c0fd1ee26820962ee3ce68e739e61f20
SHA1652a5cdd7922d455223df62c5be1e46ec8e41437
SHA256315358fd634a34ca16961cc034b6a600dc447ee35d25c3f2c61a84d63512a920
SHA5129a84e7e9c3a14181186fd5a9614a4934515d097c6e83c757d36cfa936837c6cea0d89514dbe4861e9a3f15bc545283ea036e2022e32a9ccab090fb16047cde52
-
Filesize
10KB
MD57c7b212863759c7d6ff1e7f3a35b255a
SHA1f3ba3acd109bbb250abe7e598b472a1760df0c7e
SHA25698b9d52820655d9f030dfd9f9644e203491123414c81c1dc18eb03f7744a8a00
SHA51221e8b588f6aa8ab4bbd09211686a3398d508c51eafefe6f3b8239b99688203c80e38523f557b62ca3677002689ead38f0b6c6f60d2eaa5dcabff2c23d0f52da8