Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
6626911a8192eaac737eb3c2457de369_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6626911a8192eaac737eb3c2457de369_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6626911a8192eaac737eb3c2457de369_JaffaCakes118.html
-
Size
139KB
-
MD5
6626911a8192eaac737eb3c2457de369
-
SHA1
22ac6c573491c27480b7bd06f42d8c37b9eb4a15
-
SHA256
23dfb0601f4f242d4c1100dca41aa36c0ee1ed8a0316223beea6093bab4d9da2
-
SHA512
63bf49a823e8e36efedcc96590d08d8add904766a18093f5d3dcc13b1d93a6e7be051735be85e46f1356459ac1e93c83bb23dc6c9c0e612458948c2f6f295a69
-
SSDEEP
1536:SEpNw/1loyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:SEpfyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 4524 msedge.exe 4524 msedge.exe 648 msedge.exe 648 msedge.exe 648 msedge.exe 648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 748 4524 msedge.exe 83 PID 4524 wrote to memory of 748 4524 msedge.exe 83 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 3824 4524 msedge.exe 84 PID 4524 wrote to memory of 1712 4524 msedge.exe 85 PID 4524 wrote to memory of 1712 4524 msedge.exe 85 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86 PID 4524 wrote to memory of 3172 4524 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6626911a8192eaac737eb3c2457de369_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef99446f8,0x7ffef9944708,0x7ffef99447182⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6623582889015128662,17552163398127455649,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,6623582889015128662,17552163398127455649,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,6623582889015128662,17552163398127455649,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6623582889015128662,17552163398127455649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6623582889015128662,17552163398127455649,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6623582889015128662,17552163398127455649,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD553103adf394099c8a1aafa0f5c897a7e
SHA1085bcd576d2e7a5934ac495fd167209c2df1aeb6
SHA256fde07ba0e28acbdb86804e19714b6ecbf75e3eca756e59392117d6570816e0eb
SHA512719e65c223778f78293f8285e1feb7066a663f992e1c73760bf867a9b2991a65ad2ecf6515a0876a9f0e024118ff8d0a78889e3815c88db32c5d5e8e9e68545b
-
Filesize
6KB
MD537d67c8561764182e8b9e28e557fe7a3
SHA1b04d6d1660ea9393e7338973431575503422d5e8
SHA256c8d1fe219326bbf486eebde2bc6bf44eb7f622db691043898c721cf24381c776
SHA5129a4301787d1a078972ca90961896d5a3a10b94f06f1b291e9d8c71b629bfd592c5ab1e244e3ff5f909bfa10996c463b3eb651d87e4a846199cec0d3804eeedf2
-
Filesize
11KB
MD513ebe89d8d5bb460d63779785d4b81d7
SHA1e6efaa0f92e501237ba16c6ad6669dd01f8ddfe6
SHA256c0cd04d32581853c0b57b9e4ae25ef6cf0168b70134c3c9a7ef09f60b8a1cc03
SHA5125142a80c4eb1349afb1dc9fcf5e19338aba4bcd3a360a6866ee015bdebc1f4930b3f66c4468e1c874f29d8b8f7c23b003dd96f48af6a6a2167a1609644dca646