Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
22b74944525dcf767efadac124313a10_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22b74944525dcf767efadac124313a10_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22b74944525dcf767efadac124313a10_JaffaCakes118.html
-
Size
207KB
-
MD5
22b74944525dcf767efadac124313a10
-
SHA1
fdf296c93a1fddb33efe33684c5163d282a3219e
-
SHA256
232de5b41287a1bae9765c805617e9c5510e8194a6649ba7c8bdca7cf3f14008
-
SHA512
6b52bed50db869ead107983a9181aea8495f4ad5e7e9fb9675258c66695a575d68f0479cc5060dffd92ea2d1fe27a14af83a7e2f038d445a7553a8326b9b3699
-
SSDEEP
6144:I530DH6NEQwjcHXxQRVufJc/09e1k+q5w:IuDHQmjcxQRVufJc/0w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 3276 msedge.exe 3276 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe 3276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3352 3276 msedge.exe 86 PID 3276 wrote to memory of 3352 3276 msedge.exe 86 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4392 3276 msedge.exe 87 PID 3276 wrote to memory of 4480 3276 msedge.exe 88 PID 3276 wrote to memory of 4480 3276 msedge.exe 88 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89 PID 3276 wrote to memory of 1584 3276 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22b74944525dcf767efadac124313a10_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd837746f8,0x7ffd83774708,0x7ffd837747182⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11733294528115977122,11904332566179362068,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,11733294528115977122,11904332566179362068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,11733294528115977122,11904332566179362068,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11733294528115977122,11904332566179362068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11733294528115977122,11904332566179362068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11733294528115977122,11904332566179362068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11733294528115977122,11904332566179362068,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
2KB
MD5a8ba6e5fb028ae40ccd617945abd8e0a
SHA1e61e344ad016f1eade43af8b7aa66a583d9802e3
SHA25614b6bd0ab6755834aaad098384df75e59f5b9d471d7f82262d4adf366f4ff4f6
SHA512952a2ae869520ab991f38df1513669051005a8390e959f160346a15cb73663eeadef0db73509a3330e3373b1724034838995cf44a108a91ebea097169392d8df
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5732a1df2f6a84b513aad37005f324426
SHA19990eff2c811a5095de6eb1560e8d904f32277ff
SHA256dc748cf1ea0fc42cdd05875afdcd6f195e249840d2c280b18f0e29c0be6b8a36
SHA512277de40a77e62900980863e9407cf9e9cc77b3788503935e1f4b7bb51cbbe4549e6d17d22f0c4fb947484601ee4abfcd4af10cec741f7073a7471e66ce1d29b8
-
Filesize
7KB
MD50e75af2c42e327b455941c674ef149e9
SHA1dea715058de1a751c84ec23716291fa376c30dfa
SHA25667810961113525abb68b2b555c3e620ee7f317436f9703a9ea69250c1dff15b2
SHA512aeb9471ac84bb0a6478c277a76d45976d2508c3f2306fe2df5c2d8130e87c3eaecf6f64b415d555a89a38b155079c3f15ee2e8e0da646b7e1066000c0713f339
-
Filesize
6KB
MD5a2869008c55c2c36d97cb519a77c4fdb
SHA16d9268d741d6d68004bae42585838a9f72a91b91
SHA256f3fe970eb89dda07055657fa40602921f46f5789b5fd993d2fdedf507b919686
SHA5126ba1ea6185cf9994343583a22d4311c486238f2c6312f6b17769b70599faa82996115ac53000d21ae2664f56002c88ec833cef7e1176232a46ed7a980ba9a158
-
Filesize
1KB
MD5cf607dd2f3be6f4ef0d743e3b72be296
SHA161d12397402d227aa7d3a8b8cddd1056bdfd0d14
SHA25695310f1bcd019ba6a7795407cfdd9ee6d035feaa080cc9c9085269c4f5b2e8d0
SHA51215847c8e0783816703b2b9f41650e1365176fc665193c19fc032e66474bfa81bfa641db96fd0233078ab0431170548eedd91eeb51398bcb6cdce4d4f56febaed
-
Filesize
707B
MD51ac68ec8d61c8e29f489c87ce3e6e603
SHA144deb540144bf13b542f95c2c42533b22b875a26
SHA256048c2a7a33369e233000256687b32e33cb4197b87235ebbd5c6a8b2ce04285b8
SHA512b9b3a460451f12cc820f7c4a8bec106ffc4333d1adf6b9844d3e14674f56b78189d3241aadf1d3fa2c87e14e0d531b7dae0c87a7606fd93c3427570a04f96ba2
-
Filesize
11KB
MD52b685d160c0e70d40b6fe27724e5701e
SHA1670f904b029df2f881acd8dd93910610b1f8128c
SHA256a21bd7d7147ceeecb69f5cd7aa91108bb1cc767f45928142bfc2ad4ab8b1a1b2
SHA512f1717640eb0e4f5b7e58ee0ee0e85f62ca885c6047ccab295632ce54c9abb1f520061e23c393b68ee7aff4b6844959ab3d5a66ba4f2df0cfa4c21d64db36ed1b