Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
3e28098a1531c9df4564fb9367d9962a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e28098a1531c9df4564fb9367d9962a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e28098a1531c9df4564fb9367d9962a_JaffaCakes118.html
-
Size
138KB
-
MD5
3e28098a1531c9df4564fb9367d9962a
-
SHA1
671806abfe1ee1a0aab72ef5351aa4aa8c24c8c3
-
SHA256
d2f951308c55379cdde5552fa9ebbd1160e18c4353e874d706f2079dde588c3a
-
SHA512
63f1fbfb23cfd918f7ee5de2a1426c79ed4fb9146f53752f9ffb9ae437046cebca959c523e617e9fcbeafb181d234f1df6dedbecd395598786e6ea6be10d6305
-
SSDEEP
1536:SAtzO0Q4lQyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SA/QhyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 3028 msedge.exe 3028 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2396 3028 msedge.exe 83 PID 3028 wrote to memory of 2396 3028 msedge.exe 83 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 2520 3028 msedge.exe 84 PID 3028 wrote to memory of 4816 3028 msedge.exe 85 PID 3028 wrote to memory of 4816 3028 msedge.exe 85 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86 PID 3028 wrote to memory of 2028 3028 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e28098a1531c9df4564fb9367d9962a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb91b646f8,0x7ffb91b64708,0x7ffb91b647182⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12141179043502691920,1212098908306024784,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,12141179043502691920,1212098908306024784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,12141179043502691920,1212098908306024784,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12141179043502691920,1212098908306024784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12141179043502691920,1212098908306024784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12141179043502691920,1212098908306024784,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5d0143f409e931486f67e2a86c7263c11
SHA149277671578c02bce9296641ca016fcdff628866
SHA2568b458aa736f8d8857c6229722c3af8659887e9b9197ae4301852e44ed46b3de4
SHA512e379dbc0c37749ff027b99b317a07aae1ba017ea9c51c18b2c7e19ff1aea5b7ea86e9f55456d9457ea75bf1503207e0f27740bcc59268163a16d8c87c7213585
-
Filesize
6KB
MD5f11be3f4c7293ceaf714625ac3f97ae9
SHA14ce5d3b121a71095b6e27cb6d009fe140d5a6e2d
SHA25608f178ceee9a01aea08a98669c9f5972c658f179988c09fc37b650e0a1338b9b
SHA512e7b332bc8a306e7077d02c3f28c5b8d6734a69fc49a0ad6f4bad45b693d640146f698f06dc5c9ccc994bcc0530ff493b43325880a5561b1f27e09a518fe1b1e3
-
Filesize
10KB
MD5bcdaac77222f94b31234033679674e29
SHA1e7bbab58537e3bf0baf6d4fd0a4278a96b32187f
SHA256ad582b038b78f26efe82033fdb0855ef9f8d9c0618ee4b1f3c588f563a389e10
SHA512f38cd9edfe71a38b3a690e750fbad6ffb2aba8dfe896613a7201764b910551d9c1db5e423b9abe1fcf5f75a5c6973871189500224b2b1962dec28fd459a44187