Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
4111fa2f5a24abe64a3de8790fdeb4f8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4111fa2f5a24abe64a3de8790fdeb4f8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4111fa2f5a24abe64a3de8790fdeb4f8_JaffaCakes118.html
-
Size
19KB
-
MD5
4111fa2f5a24abe64a3de8790fdeb4f8
-
SHA1
418c99daadac5798eab8e88ba7176e052c8aac85
-
SHA256
ef8cf17761450ad0b817b29971949cff2b4e363df03ec9b7ebe5e859aaba7267
-
SHA512
f56705a5c7d08968b8e855c835b943ec7b6beea5ecde4c3996ba97d9a97ac4fb20f5bd25fb290a49af5f98fd25be36fc52c74c194edcfd921571d44e9ec272c2
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIE4EzUnjBhk+82qDB8:SIMd0I5nvHVsvktxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4300 msedge.exe 4300 msedge.exe 1204 msedge.exe 1204 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1368 1204 msedge.exe 83 PID 1204 wrote to memory of 1368 1204 msedge.exe 83 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4984 1204 msedge.exe 84 PID 1204 wrote to memory of 4300 1204 msedge.exe 85 PID 1204 wrote to memory of 4300 1204 msedge.exe 85 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86 PID 1204 wrote to memory of 4632 1204 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4111fa2f5a24abe64a3de8790fdeb4f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc0e546f8,0x7ffcc0e54708,0x7ffcc0e547182⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,1726275243621952839,16561011234677126546,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,1726275243621952839,16561011234677126546,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,1726275243621952839,16561011234677126546,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1726275243621952839,16561011234677126546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1726275243621952839,16561011234677126546,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,1726275243621952839,16561011234677126546,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5312ed2132d4085b9893836f5f29bfe01
SHA1e7701dbd94913a025cfcc0d0917abc7969fedb68
SHA2560c7c66ede42adf309238b79bfab905099af56d16d26aea5e1b0c1c563901760e
SHA512cdc3e5c92b5da2760aee2913055849ab5248a1dda080afbb4f9f2ec5fbf1b58b64e5ea4e042cb1fb781841562a5be41d9c80ba3b2a496e27253931dd48c8abfa
-
Filesize
6KB
MD5afe71c4e0fbeeda390124653a3461d00
SHA1f46cf178648ffcd68363807f09aeeee6dcbc6466
SHA256aa908eeb84c02913f8ce9beda84e8ed096a37b55b5ee972b9281b7c2e64eec53
SHA51217bd42b8c7c3e75eea78be11460c6971740402203e6556cfe1a3884301abf5b4c28c4a999d5be1e180293f52df9b841c4539e2829132b07ce191239661f5e5dd
-
Filesize
6KB
MD59cfe3b2fb3394c5f3fd55ba76d11d3db
SHA1b9a212e6bc47d0eb4b13e3ea85c782ea3f3c5452
SHA25684f837009b2b4da42b623395849a0fd726f66aef87cdc989b9ec9802b7f72d38
SHA512e00992b717754c8407a6afa1db2603ae6cc1ca7446de070ff888a300a9f5c1ba071168acc502e47349bfb5e589264d2b5331e7968bc8dc962914bafb27edb54e
-
Filesize
10KB
MD59261920e5aac544bbeb0b9e295256292
SHA18af4fa54f206ced3f41a1d50d9aba188868bbaef
SHA2567642f97faf65a739ce8f116dd0bba781560e40add3fe4090a799403592024bd5
SHA51291296f1dd43d76fb00e3a780dde49dca1d2309a1269e991ab2b7eb60af1e32f0c886f6879a45004330e2f7652dcb4dd6a54d3c0e52d4db7e9dc820154d326706