Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
22a10147f6ebee9a8af39eb04282b1aa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22a10147f6ebee9a8af39eb04282b1aa_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22a10147f6ebee9a8af39eb04282b1aa_JaffaCakes118.html
-
Size
20KB
-
MD5
22a10147f6ebee9a8af39eb04282b1aa
-
SHA1
e5f1aa86bc2a150211fa602665e8f07642bb59ea
-
SHA256
a4cf41f53ac31625863b51aa0b3bb952d3fe280f2271d828a8662128d2c469fa
-
SHA512
aea96993e67a651ff53b083b1390a49c96f7451697893b3b81200f520e659c8430e04aa851363c3d70fab3b48e7b8d062b1224cdc61ea82291c6e62d2866d5da
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIw4szUnjBhQq82qDB8:SIMd0I5nvHtsvQpxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 116 msedge.exe 116 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 2936 116 msedge.exe 83 PID 116 wrote to memory of 2936 116 msedge.exe 83 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 2664 116 msedge.exe 84 PID 116 wrote to memory of 3764 116 msedge.exe 85 PID 116 wrote to memory of 3764 116 msedge.exe 85 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86 PID 116 wrote to memory of 5040 116 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22a10147f6ebee9a8af39eb04282b1aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff685446f8,0x7fff68544708,0x7fff685447182⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13307556847118191846,13416204340141774898,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,13307556847118191846,13416204340141774898,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,13307556847118191846,13416204340141774898,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13307556847118191846,13416204340141774898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13307556847118191846,13416204340141774898,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13307556847118191846,13416204340141774898,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
5KB
MD540837b5014941232c84a4d35d60dd7a3
SHA188d4f9b51a0b8e9f672a94666a70e1c8ec694d8c
SHA2563a505ffad7af7c4135f3e385dd2f941bd73a06c244786fa64231cdcca5a5d653
SHA512ac694809a6fd99bc8e5d001a8bf9a50d16766b76c5551692a8cc45c3385e24ce573e9e04dd84fc5184268b4b128d8e0cad6e4499db93f3d8194041d387bbfb03
-
Filesize
6KB
MD50d5fb749ffddb53bf021f3d1165fbeed
SHA1b1ea2df78cbc3abdcc497be7b956b5aac65787c0
SHA2568d0292b46d2998a7f34a20de33bb3046ab100965f54a5c0c105941f678e4efbc
SHA512aeddaa39bd7a9eedc45ac94ac16ef4d8238c9eed109a291e54f298a061cfdab251f6ba1d26ff7da37c7f8167b5f330bcc56581c199db379f06364651dd2a8530
-
Filesize
6KB
MD5166f62ff4a077aa3e8349bb056187acd
SHA1976529499fb3e5e83311de920fd637f108c451b6
SHA256495cfc9ab4139ff16d109b1c46ad60dd3754f60ac68ce6462f5296bb9b30af7f
SHA512daf61a99b59d58c04b8cf35ba3bba8b12b00a3d4f7c2632e4bccab9346885f363105e93ad24e8f4899f5a4469bb35c441c0881af85a4fb318cec8fe02218b295
-
Filesize
11KB
MD5ed49d7260300a8a5e0a5df717c64e7ce
SHA1e267ebabb92367663d8bd332a87778a197d2698b
SHA25676c37e87d214d33af1b25affd09cb6683ea2f3695af4ee198a523fcf614dec00
SHA512a82cbcd224a6d651ec05c97c8b840ddb3ca1fcbcd4ea5c2a2d6fd18936e8141ccc630eba771479a7d0d5ecf9d217e5b155faf7901516186d936987a493e47b61