Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
576d72d906b3847967f0a96fc13fe6b0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
576d72d906b3847967f0a96fc13fe6b0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
576d72d906b3847967f0a96fc13fe6b0_JaffaCakes118.html
-
Size
125KB
-
MD5
576d72d906b3847967f0a96fc13fe6b0
-
SHA1
eef866a36eba660a31a76da1ee2d31a1b4cc90b9
-
SHA256
949fcb2704c54998072cef98261d50f92d6724db97600987f76432f2d542bc3c
-
SHA512
01bf1011935d562e7264bcf39e736f20fc7b38446adfa7134ae1ab1731e832134ae3a5830f72814ff8d71d5d7bb3710b300a9847f9ba75817f8b766dc24cfd78
-
SSDEEP
1536:9PpcKYx0sGY1ZQQVyV5467PtpwIEcwgWPyZLvXjd:nrYx0J9w67PCcCqf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3284 msedge.exe 3284 msedge.exe 3460 msedge.exe 3460 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 4440 3460 msedge.exe 84 PID 3460 wrote to memory of 4440 3460 msedge.exe 84 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3544 3460 msedge.exe 85 PID 3460 wrote to memory of 3284 3460 msedge.exe 86 PID 3460 wrote to memory of 3284 3460 msedge.exe 86 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87 PID 3460 wrote to memory of 244 3460 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\576d72d906b3847967f0a96fc13fe6b0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd1d246f8,0x7ffbd1d24708,0x7ffbd1d247182⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6183952310437600640,11557712830724943874,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,6183952310437600640,11557712830724943874,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,6183952310437600640,11557712830724943874,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6183952310437600640,11557712830724943874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6183952310437600640,11557712830724943874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6183952310437600640,11557712830724943874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6183952310437600640,11557712830724943874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,6183952310437600640,11557712830724943874,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,6183952310437600640,11557712830724943874,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1bad6a6d-4bcf-4cf9-ab69-9f561c74af2b.tmp
Filesize5KB
MD5088969404d396f58112bb36f860e3b2c
SHA1c86f7b4b7677dbb22740c6b8a3a9d0c6c5f3c879
SHA2567b9784fb3a6e5bbdf41c4f80d378d72fdd5d8bb4497817fa40014d791e7d9085
SHA512f477de029985af16cc702217b8555bcf79f6a081ed3973a0281e39ed09c3d3decd9b695a7647d4c5b46d1934123ebb8805e41f1731530df2a0bd33e4ade90246
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD585df7daccf59e14088b84a33767c1502
SHA18879361ba31b798cf6d7918dd15bdee94f3687fd
SHA25673988dce459e1a7bf00397ebeea630e404690cc2ca9d9bbea5da82456df49c6c
SHA5122b788922c5fd88df779e87f07fd7e95c314c2e0bf8fb75b39afe16a0a82885ade9edeab49163c97c58af78550ff4bc51d9a02539e7b23fc03bf7db427308e649
-
Filesize
10KB
MD5ff601a516ac8e4b50496b95817083c18
SHA1157b4b27e6fe7879308b814db8ce5b96dc9b2fe4
SHA2567b4d8d1c962e040b29d52ad5d5f797e6be41156b96846bc501f320421f618e50
SHA5122e41a664f88d3cd619c49da11ea1c5723a0b982ea520a27c080ff9bb37664c0301af05311bdb7a007f47e649582ed396698d780206b0857d7837e365c96e1f03