Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
147db9452d13cceb167695a5c9743919_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
147db9452d13cceb167695a5c9743919_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
147db9452d13cceb167695a5c9743919_JaffaCakes118.html
-
Size
140KB
-
MD5
147db9452d13cceb167695a5c9743919
-
SHA1
e180d85f44d7c1ec48802d458a12df67162cb1bb
-
SHA256
bda98d9e2e759e590a3b439b2635ed934113b7d0d0e8262bfa2db42295d55e89
-
SHA512
794ac236d20c4981f44fb6b985177f632a7cfa7312063e7a2f6af2911dc2f3ea08cd834800f0f78ef68eb743345366bd3032c608f74d12b71169a63fbe358ca9
-
SSDEEP
1536:Sb0NUx4Cdil0I92SyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:Sb0QdSQSyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4776 msedge.exe 4776 msedge.exe 2692 msedge.exe 2692 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe 2004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1124 2692 msedge.exe 83 PID 2692 wrote to memory of 1124 2692 msedge.exe 83 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4544 2692 msedge.exe 84 PID 2692 wrote to memory of 4776 2692 msedge.exe 85 PID 2692 wrote to memory of 4776 2692 msedge.exe 85 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86 PID 2692 wrote to memory of 3456 2692 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\147db9452d13cceb167695a5c9743919_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8917d46f8,0x7ff8917d4708,0x7ff8917d47182⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14786747999921245688,12884385988060133410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,14786747999921245688,12884385988060133410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,14786747999921245688,12884385988060133410,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14786747999921245688,12884385988060133410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,14786747999921245688,12884385988060133410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14786747999921245688,12884385988060133410,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
5KB
MD5e5bbef4829f2676612ec63c6f886fc7f
SHA11729dd4c779b6bdd9f509b579a104058dcc254dc
SHA2560b9711cebf97b1fa6f570450c479e3d33f9771ed0ebaee6c922887cbf77311bd
SHA512444afedb865b177d06f1dbdba79ca05ed054fc117ace2ff8cac84aae96b5db81081606b818697ddffa753ee4eabd56b83e1605afe9ea2b59a1cd25c4ed17b67b
-
Filesize
6KB
MD51327dc2684be84fafe3a0d05a625b640
SHA184cec03a86095474545a3a23d03bfc5fd2a13bd7
SHA25641751247c6fa9470a430b6ae0b889c2a6a5ec09344dcb0ac1ea5fb44a61896b8
SHA512490c890b9f019c7047b09f674cde5e331cd203a88afe3d44dc12ba9a2dd3ef9d41d4a71158c5ebcca9f0cef373a6d0393e71af8d1c8ba8508256ff1770296d35
-
Filesize
11KB
MD5c7d4011e6ba41e408c409076d8adb0f2
SHA1f84cf6666f41b6d25f017900c6450fdb2c14095f
SHA256b442061f8b6d4473efcd1598f66cd1c373457cd9a753f39da1b838e43f6e9a89
SHA512eeedbd75676257747957fddf06be5c1f17e6533cc8bd26a44680a41c0f75d777cc786c38f125c6f60da132e2ea9fa5d19124a919c4ed2aeaeb303b5e0aa8541d