Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
2b7d76567a70ba19d6e40e21966ec862_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b7d76567a70ba19d6e40e21966ec862_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2b7d76567a70ba19d6e40e21966ec862_JaffaCakes118.html
-
Size
25KB
-
MD5
2b7d76567a70ba19d6e40e21966ec862
-
SHA1
68e8a349a64f8b208a75a9f4098e364d8f7ecb38
-
SHA256
60341827c5a45952523bdb2f6c59524295182f98b897fd4c803299396792d997
-
SHA512
bf432d6ebd5e4c8a82de13be8fc2353310d68c298ceb7f3b147cee5f253fe19bb1799d7babecde79965911c0bee5c9fe58ad3768646087c63e3673eceb355355
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIQ48zUnjBh0O82qDB8:SIMd0I5nvHxsv09xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1056 msedge.exe 1056 msedge.exe 2064 msedge.exe 2064 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 4156 2064 msedge.exe 81 PID 2064 wrote to memory of 4156 2064 msedge.exe 81 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1968 2064 msedge.exe 82 PID 2064 wrote to memory of 1056 2064 msedge.exe 83 PID 2064 wrote to memory of 1056 2064 msedge.exe 83 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84 PID 2064 wrote to memory of 4116 2064 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b7d76567a70ba19d6e40e21966ec862_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb686746f8,0x7ffb68674708,0x7ffb686747182⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,2400797942354057670,1172323199407907834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,2400797942354057670,1172323199407907834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,2400797942354057670,1172323199407907834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2400797942354057670,1172323199407907834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,2400797942354057670,1172323199407907834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,2400797942354057670,1172323199407907834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD50a22f3b9e9fc7e3c263c59c7095e4f8d
SHA171b2a6ec6902bf329aefd7be94fb10584f07ebb7
SHA256e2adc2fd0584650f03ed071adbcd2f6a663e46dabb41d6a255891bbfb7869ca1
SHA5120022571f40a363e66c51a64e9208dd5873df347d4630a334b0869b309ce34c6ccb5c407f7a30f9fc43ba5fbbd3466c0d3ec43500cccdedc14e97514ef26963d3
-
Filesize
6KB
MD5450a5b1cf41506c54f103a121edddd90
SHA1a608ac797c42981dd67407a0cd1e510df58e5948
SHA2568c05a3c49761c68d92876ccf802eff941b4bdccb44fc573cfe05d7276b9d98bf
SHA512727dbbc9b2673ec31a922ae64f628e4bedb382118b39aa8c11163517c306f816d5a94247f43d964afea5434b1fbf0b2c5a6dfe70b3bb9f80e1a4a2464c62eace
-
Filesize
6KB
MD5870e2e32fec889374ab6e3fb0de50d4b
SHA165a4676d63039d36df436e71f6f4dc0341cb99e4
SHA256497eb2d54f48408d2fc00c7b39f1b4d5c6482d23293873e6099dc35624645247
SHA512529b4b9ceb4dc4783148122d412ec132447bf00767e54fe0395ba456c6ffca0dad2b2d7c6c9301c59c3dc809eecf5ecdd9a6e60ce6a5d01ea0c10762d582ea90
-
Filesize
11KB
MD526e05a6a9404d26b5e9e756ccbb024bb
SHA1f21bca7dd85bd42d1951a643a5bd8b818263c118
SHA256d2ad65dd55d23f7a44d58447107d5e669f081965565cee36aff4182f1094a87a
SHA512a21f362dc894ac54d16463b8ac627594dee338531de836b0854efe4617ed005be20f7583f9f512a69548a0aa90847d90f1e2d64245adfa1a5854a5aa1188239c