Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 09:19
Static task
static1
Behavioral task
behavioral1
Sample
2949a1917aad3f306de29f995cb842e3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2949a1917aad3f306de29f995cb842e3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2949a1917aad3f306de29f995cb842e3_JaffaCakes118.html
-
Size
18KB
-
MD5
2949a1917aad3f306de29f995cb842e3
-
SHA1
8faa5cda06fedc21db8b87427b680bfa40a6f3b6
-
SHA256
a54367ce34bc0c975b3e365e5aaa9fb260d6bb8d8384a7e499de21420d207159
-
SHA512
bcf9879a6b5651e8c02ad5448881a05a5dea36189b0e7ef59bb9838b018fb98ac3b051a8a8685f036a407a0355b54072ceab25cb68e763ba3e99ca811a4e84d2
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIX45zUnjBhT182qDB8:SIMd0I5nvHNsvTOxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 1688 msedge.exe 1688 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe 1688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1228 1688 msedge.exe 82 PID 1688 wrote to memory of 1228 1688 msedge.exe 82 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3292 1688 msedge.exe 83 PID 1688 wrote to memory of 3236 1688 msedge.exe 84 PID 1688 wrote to memory of 3236 1688 msedge.exe 84 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85 PID 1688 wrote to memory of 412 1688 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2949a1917aad3f306de29f995cb842e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7e2546f8,0x7ffd7e254708,0x7ffd7e2547182⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10547085853270174713,9679744111849143512,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10547085853270174713,9679744111849143512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10547085853270174713,9679744111849143512,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10547085853270174713,9679744111849143512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10547085853270174713,9679744111849143512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10547085853270174713,9679744111849143512,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3134f4b5-41b4-4f66-9aea-ca96c0afd304.tmp
Filesize5KB
MD5d765704bb1cf5081989a82395efc6ce7
SHA1e092d1bbea0df195123ff6c7c0f0578a296020af
SHA2565397fa8e6af651f20c7db50f7c907465f7ce62aea67e931b2989358f0fd1ff06
SHA512f65d37819c793df09c2135e9ea0d3cbe58926f67ee27d856da51adf42ba267d405d76e238c5a8fff0ba30f55ff0441495fa344e0b5450bb37e6fd250f669a203
-
Filesize
6KB
MD52fc252d34a30e627821fb39f8323377c
SHA1f1faf5bd05af2234f4edd5ccc1882d31b8baa38c
SHA2567659ad68f1b26d3995ef11c258a7e277250f86a0aa9809ad9c2f5e6b347f1287
SHA512bd1c2d7242971cf385c4440d303ddd4847fe51050f8322d2f99c23b5688a2faaa0573414b6f3e97081ecdcf7963cb5f8f3a91f4cc85f23ff86eb370402e677e9
-
Filesize
6KB
MD5341b2aaa6267b45e42ce8e559e90c1da
SHA1577df8ef91be623f36dd054c86272062db599f7b
SHA2568bc6eab2d9f814e720088c55db587e8d0561d0c235f7ad4884aeb80d23d4c26d
SHA512bcb3ed86d9fd123554597eceb316755deb345422e204a64539f810fa77badd8fad8637303094cfea0e13b7c2224e0211c2c33cf2aaf8ad685332fd79efa313da
-
Filesize
11KB
MD5ce127514ddaf16ef07638e2d386f662e
SHA1806850d5d114c193dc3265f24474411f965967f8
SHA2560bc0e20bc9b956f75abd585485d3ba0855ad5d0b7d9890bc681d3f0becbb8b73
SHA51287703ee0950b980989d6d4c6abd01f98b291e858ed62efbffbebe9dc0a65d862cb0c28e4e14501734d9cb36d9df6d8147fec75ba11477bda75bd797d947da599