Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
41c9f68d75e7decd7af077b56cb4b1eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41c9f68d75e7decd7af077b56cb4b1eb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
41c9f68d75e7decd7af077b56cb4b1eb_JaffaCakes118.html
-
Size
138KB
-
MD5
41c9f68d75e7decd7af077b56cb4b1eb
-
SHA1
5610bdddaf37b5bc2e3146c384c4c094831842be
-
SHA256
f9ea8aa2fb4a47766ea4023cba546e38e16d2c4a4193e8f122e5421dfa56de5c
-
SHA512
df96d82eac6997da00cd23a81d90bd48b2acafbfcb75575dd6c661caa4dee8597f14e1b7ac549882e0cc8f2cc48bb36542fe452ef072249403de8fec2a9ab4aa
-
SSDEEP
1536:SPfOxemlPDkyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SPtcDkyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 408 msedge.exe 408 msedge.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 408 msedge.exe 408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 1212 408 msedge.exe 83 PID 408 wrote to memory of 1212 408 msedge.exe 83 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 2388 408 msedge.exe 84 PID 408 wrote to memory of 1100 408 msedge.exe 85 PID 408 wrote to memory of 1100 408 msedge.exe 85 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86 PID 408 wrote to memory of 4104 408 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\41c9f68d75e7decd7af077b56cb4b1eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff359746f8,0x7fff35974708,0x7fff359747182⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,39311881543236071,1924228926572590171,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,39311881543236071,1924228926572590171,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,39311881543236071,1924228926572590171,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,39311881543236071,1924228926572590171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,39311881543236071,1924228926572590171,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,39311881543236071,1924228926572590171,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
6KB
MD593f4516c5d557aaa9c248e6e9c75bdf6
SHA1063f433e2acd7acf63aaab9d3f645117a94c6504
SHA256427d2ad4a15c2c7233e92bed6fb0f50489f2a76316cb4c6d45155ee2d24847e6
SHA5122c3f333a7afdc1856e6e509fb69cc9a3e1cfb22c45a999d17d451662280b0daf9efa799baa2499db4cad2fb673879213cedf8801489d582412f9c9a604aa5341
-
Filesize
6KB
MD5e7efaec7758caa700853761506233782
SHA100e422eeee86d875a71b89d1e1b16490ccaba876
SHA256ebf0294942bc8b113aabcfce606ee4083a96e283a90300849f52d6a8e0ebb503
SHA5121fe979111cdd4b43ee94aa3fa584a9a01569e9dd98709845f7967a724b547b4c64f2ed12ea3846b6de5482c7383f3c22468169c52ec473b35513ef20b2715dcd
-
Filesize
10KB
MD529eacd5cc2ea2ef75f0d506328d5d1e2
SHA1c41bdfd2888cba2584acb214d8d94f6d92700736
SHA25670a434aa72dc7858459810b048ae62c407ba7e2fbc767f37c976c5191500bc02
SHA51261501db5e888f719c6f9a84ef5e12165bc42afaf59b8aff626324183730552251c9c6dbd872cdac297a2b2136cc2e6adf31d8253ac0a4edd26abb6417ea7ae91