Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
5455c1611da07f454ac8e7f0ce6b1555_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5455c1611da07f454ac8e7f0ce6b1555_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5455c1611da07f454ac8e7f0ce6b1555_JaffaCakes118.html
-
Size
214KB
-
MD5
5455c1611da07f454ac8e7f0ce6b1555
-
SHA1
0a5d5e241e7527913614bdb971d0c02751411fb2
-
SHA256
b02e0ddd003b90f0cc20310a9a432841cd9135c52b4c69df0c49028faacdbfaa
-
SHA512
5c99fa65764e572068f15981a7def6d3e5d3514f0421348b2e54fa5ef1639138eb89077c3ca37dc2bcbbacea96ff9e69f39fc387c4b9888b75fae750a323fd34
-
SSDEEP
3072:IrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJX:Qz9VxLY7iAVLTBQJlX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1320 msedge.exe 1320 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2044 1320 msedge.exe 84 PID 1320 wrote to memory of 2044 1320 msedge.exe 84 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 2264 1320 msedge.exe 85 PID 1320 wrote to memory of 1988 1320 msedge.exe 86 PID 1320 wrote to memory of 1988 1320 msedge.exe 86 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87 PID 1320 wrote to memory of 4680 1320 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5455c1611da07f454ac8e7f0ce6b1555_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce47c46f8,0x7ffce47c4708,0x7ffce47c47182⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10792686230850296929,14419952260618283168,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,10792686230850296929,14419952260618283168,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,10792686230850296929,14419952260618283168,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10792686230850296929,14419952260618283168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,10792686230850296929,14419952260618283168,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,10792686230850296929,14419952260618283168,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
6KB
MD5c1d7150e07bf595a6b047d0ed19dc1e3
SHA1ed0b6f87b75013137b5801e20c783ee0556027fc
SHA256dace321745fc47be9fbbcc887f9f4f8d903c174119143d58c479f3e27de82378
SHA512b1864fd1495066be6471f677e2ea3192b33780a05e85ec1002e26dd6d245e6d7a6cd7d9acf9fdc7c09946e39b9a559bca7b55fdfcda8f93d193b8850d7ab26dc
-
Filesize
6KB
MD5922465c8e57587eb67840a0cf2ad3b5f
SHA10af242fdd4bd383d91c92af6fd7ff64be923ef4d
SHA256945dcee4ab1affc77d86e34acc7672ce54a06b1d1afb57f9b815b12e663457a2
SHA512f1f92054b456a3d089ef29502465299a59bfab26cafb0dc775bcf9956df13344d7de2c01fc5710440ef464ce48ca4b20691501bc03fda1a5be95e5aba9389e51
-
Filesize
5KB
MD5062905a10a56f31c1942eb4d633b4190
SHA1ce4c403a46f21fe842d86e1de553e5a876ec64f9
SHA25699826d335b2941aafca887e35b98bba2249f77cf17dbadabc2ffeb90157bb13e
SHA512a69cdc36bb2f4721b2c3ab57f858800e35bfc25725d3a63311ef175443f0aececde4cc956e8c77e0b23b4398756750772a76d5df0048880964d246b1a25bffed
-
Filesize
10KB
MD5c370e4e3bc3a323f37f3c48a1ba2fb72
SHA1341aadefb9978937e4c6b3e4d03cfa5dbe791cf1
SHA2564701e5a6fa7a0e662f0fb8858a3f00db409322a614af7c3999f7b80699517c24
SHA5124689ee5ab8e63323151333e22dee80e0db5e153017e17cd77708e3f806d6776f2fe4c76b32bdfffca1380f4f6dadadb27c6c40390c596ee87b2bc5d528dc701d