Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
247ea935ee80bed73e617271dd37cff9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
247ea935ee80bed73e617271dd37cff9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
247ea935ee80bed73e617271dd37cff9_JaffaCakes118.html
-
Size
69KB
-
MD5
247ea935ee80bed73e617271dd37cff9
-
SHA1
691c5a7f027e478d696cab9d0057ea9e98642924
-
SHA256
b173df855770e0be49740088e029f035f147845812a37720f5c40eee970416e2
-
SHA512
328644749b91847362c459f8b9be5b01c08c77bfc613f7e10481c9a0729d95eb3e6aff5ab2c8be7e742cfe1cd8d74189565c09f8022787483f14d45638439fbd
-
SSDEEP
1536:BSAPcpxpTYIDb3YHuRaB4Li3bVraUMxOR1gyb6OhjJ1aGyaIBq/A90QiMmjNgoEN:BSecpxpTYIDzYHuRaB4LqbVraPxOLKiy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 1100 msedge.exe 1100 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe 3928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1052 1100 msedge.exe 84 PID 1100 wrote to memory of 1052 1100 msedge.exe 84 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 2892 1100 msedge.exe 85 PID 1100 wrote to memory of 4544 1100 msedge.exe 86 PID 1100 wrote to memory of 4544 1100 msedge.exe 86 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87 PID 1100 wrote to memory of 3048 1100 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\247ea935ee80bed73e617271dd37cff9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7111147821202680508,17471496340801037990,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7111147821202680508,17471496340801037990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,7111147821202680508,17471496340801037990,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7111147821202680508,17471496340801037990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7111147821202680508,17471496340801037990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7111147821202680508,17471496340801037990,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5424 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
69KB
MD52152970b5975237996584e968f873e4d
SHA1a3a1932f1cc399d24818c43f908423649d154c65
SHA256473459f3fde23ec4472e023be9f60c95f530cfca06d353f7a0399ec80e778c99
SHA512329061c3e28c7072480571d603ddce9dd48e48b5cd04c0a71c29feaa49aa60b22f4c298fe225cf92c4afddbb55aafb6369f5f038beeb9738b168771d37ff6ee8
-
Filesize
386B
MD5a608e815d2096713391c482dc17c37a0
SHA117aeb054e3536e7410bc4b021a8e9b70f860f0c6
SHA256dde518ba281fbd27d9cd6a1515d918b5e2ce9f41d11da8fa8b97818740f7b946
SHA5127382633ffaedf4a05244133179dbc4dbbab1584dd4afce030792166d31a7284e83104f9c5d06756d6e7aed9a23fbc797c5b3f37dc6d771ad33c4f9c551d1a5d4
-
Filesize
6KB
MD5fa6d5b3c4fd59a63cd1135e6bfdabaf0
SHA18d6b9a2ffb55f472c419b32ccb05033b362bf0b6
SHA256f4e38753b0c86d11723b0e052c449412016653c6e76069b71ada8213acaf0f62
SHA512b52d1002de8718c7e5c5de524f45ac294b45bac0a6df4ba35fd942be08a07ff0394dea465076cb89e09cc56e12531f8100d04645a18c770cce97b23192a8eece
-
Filesize
6KB
MD55d58650def453fb6468640924308d9ba
SHA1d611ad69574dbb6e376113b7898e63e6451d54a4
SHA256bb04e956825b3f917206706a95e20604faa771d3f4415f729905998328c17350
SHA5124d479fcb555e88936dece6007c0bc5e8b02222632e073c56c7f4c8e0208a35d2939123746a8709bc9be08beae2e9aefb7a4fa937740e368002529ac946bece3f
-
Filesize
11KB
MD5174f78a970caad1f6e1cb8bb9a050a35
SHA15789a2730db4baa3ae125c33c07b4d6c95f2a938
SHA256c5a733a8698b1559d57f1d154668d909a8305806feeabc9d2798b86c2abc438f
SHA5129743db110a6e985966b9d875f85650adc08ad787a048be481a9867d4f831b6942be834901e08640dc9039b0df46489266b265a9d37245e04c38ca89c77d19992