Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html
-
Size
19KB
-
MD5
2127ca3e2cbefb854156f32e0252c8cf
-
SHA1
80c744b40f842741e8b346ead11462bfe29d293b
-
SHA256
58f2c1754e8295622b1850c11f1fc4cc06c10e44da37895d850a3d221c79fc57
-
SHA512
a4742b7785cc0e71d4053f5fd4eb05d526c5ea67c767f327270c50c7959fd8308efad77dc14250fe6fbd86666cc10038fa5a77e01109e93c0002758f1dd28da3
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI74BzUnjBhb982qDB8:SIMd0I5nvHdsvbmxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 3632 msedge.exe 3632 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3632 wrote to memory of 2396 3632 msedge.exe 83 PID 3632 wrote to memory of 2396 3632 msedge.exe 83 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 4448 3632 msedge.exe 84 PID 3632 wrote to memory of 2268 3632 msedge.exe 85 PID 3632 wrote to memory of 2268 3632 msedge.exe 85 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86 PID 3632 wrote to memory of 4048 3632 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8917d46f8,0x7ff8917d4708,0x7ff8917d47182⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6787743634320793400,9293654794934628181,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,6787743634320793400,9293654794934628181,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,6787743634320793400,9293654794934628181,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6787743634320793400,9293654794934628181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6787743634320793400,9293654794934628181,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6787743634320793400,9293654794934628181,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
5KB
MD53a528a38ea96fc43dd0e4ab7ca756882
SHA1687abde7c3416f090eb0ba75088ffe6d1be09668
SHA2560456567da19dad42a11ab30a72b844ed467ac2d346c9a9b5d905837c57aa42bd
SHA5125cf59e844f8177b8776d1af27bce06f9b62b4cc1c9a3ec50641776ca20162cbbc13ee763814768c62e5ae88ad293b87587019c3d34ce73377e35d5b4d31b6467
-
Filesize
6KB
MD5ddcca836cc597a7a1e4f0232b1064a3b
SHA1c82cb24a37aa0c6a60aba7603440f606c291a375
SHA256513da56187f771ce905331b95f89836b3ded47c7e0f308f22736c78d4a0efe63
SHA51216e9ed1fcab02310908d717d8b6b27477f64967fff8a3b6a1efcfd6002d18c70ffb4f6c944425443f6fdf55741b2a49cc1ec796ed108416a2174fb1d8e8bb1d5
-
Filesize
6KB
MD529e4464f1f74e5a55a599a395f48efc2
SHA1330b2fe0cb8e5a767a98be898c4c0c6ff34e029a
SHA256c301aba178f25be944ca40224150435231f940b7cd1d2827a6116d69205aa2b2
SHA512ade5499763031a49b48c2ac9615f92c35084c6b0b0eb6c9de4d674a512ace1315337469658976f3e72767ba7b855b7c4152f614ed44a94cb8b785687bc552693
-
Filesize
11KB
MD570d017e245ee085d80090e0bc87a48c2
SHA14f4aa0f2e7958a1a469f42fbbb03c0d003296f83
SHA25637fe9b84eed9af8704ca7afc8c72405474f2e3c09fc5eed3f962c3119a34f13c
SHA512ddf8c5d9cee6c7548f579a1a742e2223fa6fecae3a7982923d9b8c9550c11b442e4c77bcb3dfa1c1d480ecc8ec512267bf9038b5c67c4fcb4f67d6a170653872