Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
22d6db881c5325fd3dc7ebecb52a0763_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22d6db881c5325fd3dc7ebecb52a0763_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22d6db881c5325fd3dc7ebecb52a0763_JaffaCakes118.html
-
Size
19KB
-
MD5
22d6db881c5325fd3dc7ebecb52a0763
-
SHA1
d536bd4d054e98ecbb34861441d3a1452d068170
-
SHA256
5011ed4b41c8866ccdd0f5e89e6e34b253f4af55c156518f5822c6857fa2c9e5
-
SHA512
915c2eaa2b52bdc99e2be425de6cc7473bbdf28146fd936df6270919c9d52c47b55ba33ed21ad9c5854d960c79c5d440d2a9221274a8ae184d7df365e5bfe45d
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIK4qzUnjBh+w82qDB8:SIMd0I5nO9Htsv+zxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2060 msedge.exe 2060 msedge.exe 1352 msedge.exe 1352 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2084 1352 msedge.exe 85 PID 1352 wrote to memory of 2084 1352 msedge.exe 85 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2360 1352 msedge.exe 86 PID 1352 wrote to memory of 2060 1352 msedge.exe 87 PID 1352 wrote to memory of 2060 1352 msedge.exe 87 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88 PID 1352 wrote to memory of 2056 1352 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22d6db881c5325fd3dc7ebecb52a0763_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa5c546f8,0x7ffaa5c54708,0x7ffaa5c547182⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16906669371011301559,11478925012996425550,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,16906669371011301559,11478925012996425550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,16906669371011301559,11478925012996425550,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:82⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16906669371011301559,11478925012996425550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,16906669371011301559,11478925012996425550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,16906669371011301559,11478925012996425550,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
5KB
MD56ad8d01a77d5584d91828f402ad8a48e
SHA19434b59eff23ff7513dfec21d11dad67ea84d66b
SHA2565ae98ff7a702bd9e99bc4ecdef8c9f0ecb3bebbdb9088aa91643246440edac43
SHA512decc391ac93bc291ed695c63e8c0d4cb65c81c48fe100e4fab805fd4aa4074c29c9a3df494a0819f316528709c96e8cafdab5e708a7a5474263b5a76ef743e53
-
Filesize
6KB
MD59d6a077be3e6416c3136f33926d8e8d3
SHA1808dc45bf496b190faeea651098152de2affa02d
SHA2566c4e425b5e7ae5c8b6737d53543ffc9855e5db47fccd5bbf1db5283464b6653f
SHA5124045fd48267d4b46595b31428bb8300a575ad73bdf5207c431a7990ab251fbf6588342083d43d01e02f354fc2c70115146c9af1be4c9a6afab815ec2d37d98e0
-
Filesize
6KB
MD52b2304b1ad4d3b0ad807af7f88456a1b
SHA1e064e7775074d50ab59a2f6b39cbc6dc76bb2cc2
SHA25605875e11548f484b0a22a0d7a62e51ded68aa20654e8f4806809bd7f6116d62f
SHA5121321de4d587dddada37837ff682060724d7a700436ebea70a3463bcb974ab2d46b995f8e7c663998d0997a09b283eb245c95ade5c89664ee0a250be3ced2d0e4
-
Filesize
11KB
MD57004511c83efbe7efd611869191ebdaa
SHA147da8b3ed55c97dfdad5ee00675433d49b8f0337
SHA25642cdf144e2023a46264fe6c3b710cf3c108eb98b556cd5548e898613a54c50e7
SHA51251e47857c7bc585c6bd51fff45da33dc8ddb6af3a60fa3163aa428c4d361b9c624424767541fec51ccb92ebd551ae9ce61571273d209daadce52243fbbdb7856