Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
6028a4ec006a730267363dbc0eb72e90_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6028a4ec006a730267363dbc0eb72e90_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6028a4ec006a730267363dbc0eb72e90_JaffaCakes118.html
-
Size
139KB
-
MD5
6028a4ec006a730267363dbc0eb72e90
-
SHA1
5b1bf3aa8174e7f5b0bdfb1c37d762753c2f2d44
-
SHA256
5109f898763d8f0c390f4ffd1a49380a4afba3cae2a127b0da3402e34a447cd3
-
SHA512
a8780635825ce905644e048c11b08745b86d209d0096652c0e69e4e593e1ba40b2d57b966a54ded269a9b66cccd21587874ef6194d0584ca424b5e11c485f5d3
-
SSDEEP
1536:S2PuTYDcClAzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:S2BDcTzyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 876 msedge.exe 876 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 876 msedge.exe 876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 876 wrote to memory of 4644 876 msedge.exe 82 PID 876 wrote to memory of 4644 876 msedge.exe 82 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 2688 876 msedge.exe 83 PID 876 wrote to memory of 4080 876 msedge.exe 84 PID 876 wrote to memory of 4080 876 msedge.exe 84 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85 PID 876 wrote to memory of 4544 876 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6028a4ec006a730267363dbc0eb72e90_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe676e46f8,0x7ffe676e4708,0x7ffe676e47182⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17189835103499474461,6010891066834014166,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17189835103499474461,6010891066834014166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17189835103499474461,6010891066834014166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17189835103499474461,6010891066834014166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17189835103499474461,6010891066834014166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17189835103499474461,6010891066834014166,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD52aa55dbe60af5cea45a6685db0e23847
SHA108aab048363cc1bb09c8911964f08ced7c087365
SHA2560719854aa245d68420bf37e79492461344dde76f60e271a0a551464885771aec
SHA5129b4f99ae49547bdcefa62837174baaf73630535e1c0d39e391b2aafd94560381c0275c92aa61856dc162a80756d4437e8de3eae23192771511e1054825606dcd
-
Filesize
6KB
MD5f1eebdb84c91b9291c4bcf7d038e0e45
SHA1f38e948f010555cdd0cd3c18e5b70bc36e8336e4
SHA256acd449910112c08b87542db20cd2869cff72686a4ba4cf5f5205ac8b87793dea
SHA51253b923b1a8e345ea823655b1ff13f2cee689fc93efbc9f4f50bebace212a9ef3da0f991b71a8dd487784283b0b4b5d67266d1d288577bf5c57d5d3ebd8351fec
-
Filesize
11KB
MD5bc7b0414add6d5ae3424f44720d42f3b
SHA1f45a8bb019704ae7d2968822ba26a79718022e72
SHA25648701af357f7e9e39595ddb0b6e68fbef4e1c02c11b52abb3c1c6d259437ee05
SHA5123d580bdf11b6a2354967f6b018fda807c543f07eb6b69891e05cdb784c78d3b269fe4900498d618d7866a4ced9018fef60333061f58283079a5233f0d8a74e44