Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
45adab3cc68120423c35014630cc5f07_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
45adab3cc68120423c35014630cc5f07_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
45adab3cc68120423c35014630cc5f07_JaffaCakes118.html
-
Size
139KB
-
MD5
45adab3cc68120423c35014630cc5f07
-
SHA1
e42a4276b0f4ec9b27a8278b01212040362abe97
-
SHA256
c716daa2c35a2ddc8146d9c1c6ac48840ec664e40f3bbdd29494b34c3e30223c
-
SHA512
644ab235d3f94e05da89639df26e2614beb738797b6953d3e951fcbeb86a66fa6d739a4ff91e18aff6916e1173d0fec3b1a15c120910586cfbd1e580a6d18d71
-
SSDEEP
1536:SJLXdmxsJ89tmlnyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SJLetyyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 4868 msedge.exe 4868 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4696 4868 msedge.exe 84 PID 4868 wrote to memory of 4696 4868 msedge.exe 84 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 2644 4868 msedge.exe 85 PID 4868 wrote to memory of 3936 4868 msedge.exe 86 PID 4868 wrote to memory of 3936 4868 msedge.exe 86 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87 PID 4868 wrote to memory of 4116 4868 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\45adab3cc68120423c35014630cc5f07_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9eebe46f8,0x7ff9eebe4708,0x7ff9eebe47182⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16376826687191273093,6694407632622008011,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16376826687191273093,6694407632622008011,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16376826687191273093,6694407632622008011,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16376826687191273093,6694407632622008011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16376826687191273093,6694407632622008011,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16376826687191273093,6694407632622008011,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
6KB
MD579a8439c9a0cb787b3ec4821c28da09c
SHA1eb4ebedc61bc06d1a8271a8327edcc031dabd7a6
SHA256f688fa560bfb7ef13a2cba657dcf06e61d051bf94592f1b3da70459a2a8843ad
SHA512ef953600aa90022ae60a755fba772dde0554515b93ed975c8229ab5427e44611dfc2024483a72cf702a651b74e46684684a964dffb594eb96e8b5361440dfbdd
-
Filesize
6KB
MD52a8050603a6ad1cb60e7ddb2d2c3109f
SHA186947a9f61baeb01d1ed5f4830c6cf6ede888706
SHA256b37955d79b5c955e8376e71e9641ae2155f253ca44a4a2540ebdd3ac87f49846
SHA5120b66f92b9791c706c8d7cec54198b8b6e036497102142951d01b35eb4244f8906915a2e18c690abe56fc18996dec57cd55bc80ee45de39cdfd14113686b6df3e
-
Filesize
10KB
MD586c21fbd8054c448550ed790f1600b8e
SHA13aa6b774d08f283285cbeb670d148c1611b76d99
SHA256a59c6e1e49474575e4586c8f99bef89e8c2c8fd5af8caf5a423ca3e8a9af1e86
SHA5122c319c4f386c7bc7d44146ef1781b738baa5f5f26b2ace20c04f52d53d5a3fa65ab9552e3aacfea19306800a473f89322616d63b1d1da132206c9b8973321c42