Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
3cda6cf509ad9381882c68c679cb9863_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3cda6cf509ad9381882c68c679cb9863_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3cda6cf509ad9381882c68c679cb9863_JaffaCakes118.html
-
Size
13KB
-
MD5
3cda6cf509ad9381882c68c679cb9863
-
SHA1
2d9f1a7b24e509c05dd095ba9f02fd60a0503bfa
-
SHA256
faeb759cc5373c640f20ef4e7b317bf9f2d19194e166f1ecef4b6c727f6e903b
-
SHA512
72951f8dcdd8e5f84d489f0a94b362dd34af891feebe994c2970c9f114eba53f0acaff9478051a8709124b0c8bfd3ec98704e70f241b222efd2105e5e9c6d1a8
-
SSDEEP
384:SIsW3eSJQY8Is6rfSnjbKzr/laJQaa9vu59l4T2:Sv8eSJQY8IpfSWr9taa9vI9lR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 2940 msedge.exe 2940 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 5076 2940 msedge.exe 83 PID 2940 wrote to memory of 5076 2940 msedge.exe 83 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 924 2940 msedge.exe 84 PID 2940 wrote to memory of 4356 2940 msedge.exe 85 PID 2940 wrote to memory of 4356 2940 msedge.exe 85 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86 PID 2940 wrote to memory of 3656 2940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3cda6cf509ad9381882c68c679cb9863_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8231146f8,0x7ff823114708,0x7ff8231147182⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4988695529520553573,18185466507042323596,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4988695529520553573,18185466507042323596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4988695529520553573,18185466507042323596,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4988695529520553573,18185466507042323596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4988695529520553573,18185466507042323596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4988695529520553573,18185466507042323596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4988695529520553573,18185466507042323596,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
186B
MD51458754278f7102f93ffac76f859bd46
SHA1281850e622652e26ebafd0fd3afd43aff8d68604
SHA2568799ff47ff6ba85e9758ed3696cb89be62f5907f6bfd6cbd1f65f342c807d498
SHA51261fd0ba23e1a73af1321d1d3175121886b7f0db82776b415aa7968b083f302975eacde41c8ba2f9ae8e83c9d8ef67fdcedf8c4bfbf8932a93027e2b6caa1b296
-
Filesize
6KB
MD55df8ffecbf81a35d90bd7686d95e37e3
SHA19d6920cc3fd589a8406710306b2a2085db342510
SHA2568a199e9f6d33b3f67ba27dfaa6c6afed487689a820d62ef48b846f7803fb5f5a
SHA5120c95a1a53c4a685b63035b649cf0e2f9c7548af60f2fd7ff6c59990c28d135c66556b6fb8afb4342f2ec546b3bb6b63e20344a04a9f8ba6c0883287dd50e7810
-
Filesize
6KB
MD58829c87ba703817374ac5daf9c00760d
SHA174ea23bd034e6a04df107bcda4855b3a28c1a9a0
SHA25667a116cdeefaa4d08657330d255f13e65f7a07d9e68ccf541ba15e078fdd9c96
SHA51232c0ea911a354a60adbcaa6c55c86c67fe40e225ceba4e64f6672db1f37b825944a6fb220f4d15772c15b65ffd8112e26e99d436920e04d72467f268abf75643
-
Filesize
10KB
MD57c99fcbbadb7dae9696311631fa6700b
SHA13ad35b5c0a7ba7bab9f1f647f436b489a5a343e0
SHA256253870b7863dfb299f57d5c609add9bd9ebc6c25cd458c401aefecbc45a2d139
SHA5128fdd5e9061ce3b1f1d14775c24e289b155fc014b498e08e25f745d87aaee86580d5eda039db6bdc64db98b55c4c8d88ec42eb1064831b1741d2e9752f6fcca85