Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
3f9bdd28dc5ff16c16a9b75428499f36_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3f9bdd28dc5ff16c16a9b75428499f36_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f9bdd28dc5ff16c16a9b75428499f36_JaffaCakes118.html
-
Size
214KB
-
MD5
3f9bdd28dc5ff16c16a9b75428499f36
-
SHA1
567696df17c3a0bfdb1a91867cb4e2fc3221ed6d
-
SHA256
5875cd4ee1f85801095858a720c81c0eb2d0e248f857251bfce25602080316f7
-
SHA512
dea9f0545f186228882a5b8411d637d5cf4f5c9926d7620419bc32616e1a0a7e194b6587f2b3e5329a66dbcc136ff9a8daf3b422cad3a1e9138ffad702ea8220
-
SSDEEP
3072:UrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJL:sz9VxLY7iAVLTBQJlL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 3676 msedge.exe 3676 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe 312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3676 wrote to memory of 4816 3676 msedge.exe 83 PID 3676 wrote to memory of 4816 3676 msedge.exe 83 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 4120 3676 msedge.exe 84 PID 3676 wrote to memory of 5000 3676 msedge.exe 85 PID 3676 wrote to memory of 5000 3676 msedge.exe 85 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86 PID 3676 wrote to memory of 2104 3676 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f9bdd28dc5ff16c16a9b75428499f36_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb94a046f8,0x7ffb94a04708,0x7ffb94a047182⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3105798352520173876,13720805184744448774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3105798352520173876,13720805184744448774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3105798352520173876,13720805184744448774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3105798352520173876,13720805184744448774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3105798352520173876,13720805184744448774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3105798352520173876,13720805184744448774,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
6KB
MD56dab77a71fc43a4c875f9410d825d037
SHA160de2f4aaae78da041d97e8f8a3d9ea292c59ce0
SHA25633ee6c929c135ac816dbd8871cf5bc0264c50267f7744af791e6d2caeb7fae02
SHA5127b6b71e279863e75cb3af78e143ec48cd94cf1eb2efa026fb2e718e788bdd2e45805d3989fa09567ea1be9f0bd72bb54b2078a4c2186bc763b849233a2000ed3
-
Filesize
6KB
MD5136b069a20ff03855f27cfb72937b3da
SHA1faa9a227a7f1758ba22a3408f2c3de82ea2b98e4
SHA256b74e6237272f924106e609c9118b2806725266aebd5c94eeb249bb3b1677a4a2
SHA512fb54ed54b72ba62ea223b4e06c54cdad1bb4ae1a6fac93000a651fca3e1e065badc36893f473141ca8fe7eb1f17812cba598694847241e1cd3bf8fe40fa59af8
-
Filesize
6KB
MD504eba9d2fb05833dc42e895a25489b0c
SHA13b5a8fbc7db7e1d76cd510e1a6dff3e2e48502ea
SHA2560175a390251dbec6ec424ac292b542c50e5e3cc7043666c82171dd3256c1ad8e
SHA512fa5f33487ed2d44ac9f6f1e286724cef989c636b6734fc11218efe89b8805ba8b727ec7a8413de8e2726a34df24454dfdb12bb556214630d094c4aa571e8548b
-
Filesize
10KB
MD5a3ac6f853e45f2fb352be6066fa6617c
SHA1b181c1e7a36b70fe6400e4afe1adff4502688acb
SHA2569e94ce5a0965b0ba6519718827ee45b52d79cbad1834fe9af269966436b7c683
SHA512d3fa5b4d4213041eba7442897cc038a6f012c3f216859ca7a27d01016a72169703b507e36ffc0ac9c44c3bc1f94eda242502e5acefee5702fb3a07e1fdb53066