Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
53d7f1c4932244d1f3c1dd2d6323121f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
53d7f1c4932244d1f3c1dd2d6323121f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
53d7f1c4932244d1f3c1dd2d6323121f_JaffaCakes118.html
-
Size
141KB
-
MD5
53d7f1c4932244d1f3c1dd2d6323121f
-
SHA1
7f07171f45a75bf97074ea34a4941599ceacb7aa
-
SHA256
1d40c93eefa4d4bd18122e21f07a6064a1fa42128c0031f6552fd0e76eab2ec4
-
SHA512
073c69d3375852f8b2955b0310945c5b2b1a0f63ae01f32f1f6ddd9db16f3a97eed84a2937bce493de762569f7fe56e2586c4bb0590ab622ab9cbc39f2f05c47
-
SSDEEP
1536:SbygUro03ANx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:StVMwx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 1692 msedge.exe 1692 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe 3528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 648 1692 msedge.exe 84 PID 1692 wrote to memory of 648 1692 msedge.exe 84 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 2684 1692 msedge.exe 85 PID 1692 wrote to memory of 3576 1692 msedge.exe 86 PID 1692 wrote to memory of 3576 1692 msedge.exe 86 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87 PID 1692 wrote to memory of 3400 1692 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\53d7f1c4932244d1f3c1dd2d6323121f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4fe646f8,0x7ffd4fe64708,0x7ffd4fe647182⤵PID:648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17291254906581186509,240263348202954886,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,17291254906581186509,240263348202954886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,17291254906581186509,240263348202954886,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17291254906581186509,240263348202954886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17291254906581186509,240263348202954886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17291254906581186509,240263348202954886,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
5KB
MD55befa17b9a5564ab6f89810014ad396e
SHA1098740dea9b916e363f02107e0102c793f6074ad
SHA256f195aec03a335a7f009568015ea51cff0b98a69934809f24b79be18da0c17f76
SHA5124e74ef69367706cf53365f2d9f2e687974dd1faea00aae10810149c6f1234f2c97db0e1abee2ea4910d33c58c5c5fe491da3c056bf0c9bd3af576262cd2e836a
-
Filesize
6KB
MD5fe75c0c35db5a33e52c74a7bd793d6aa
SHA147f634e9c790bab97e7a0bbaf972c4657b22424b
SHA2564a55bf31c74563e3c0a51c801bd9ec7cf31019841829f93cb82b8c326f6a78b8
SHA5129cafaad05044d3e8b3851a526bb95ec06fdbfc07a9f33164d70c65d22acb1068aceb7fa8145dca7f3d5aa21cffe7a2a4ee5cfdcda76546b4bd85403af9807ee5
-
Filesize
10KB
MD5deb1250103d175baa19777837ce93cf4
SHA153b5bec108e474d52c0b25d07c8684ee1ae8e58d
SHA256e0b9c12fb30e986c63c534eb0fce3dfff36d153e69bdad72f80b9aa4b1dd898a
SHA512441cabe5d95b5c90ee208640efc4716ead11a78a1b1a3f7382c5feb43dbbc1ed5e67000daad2173f6522e91ecd64ffdbed3dab8a0ee512e6c2a022203af3baf1