Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
66ec1a035435e307bb0d05225024f3b6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
66ec1a035435e307bb0d05225024f3b6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
66ec1a035435e307bb0d05225024f3b6_JaffaCakes118.html
-
Size
18KB
-
MD5
66ec1a035435e307bb0d05225024f3b6
-
SHA1
e0e8fb021aa78149f1b9d39c3603e045a23ce5f9
-
SHA256
69461718d8ceee4eef70ada87a7a988601944c4bc1a7f37dd8427c9829dfd235
-
SHA512
b8dc8bffabe8a425cb9e9a8385e61afbc3e78802927aeb4da3ac14cc9b2f282bd70b5e6623cea6c26c9ba3dc179330766592b753162be98eb991bef0f6509c23
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI54zzUnjBhl/82qDB8:SIMd0I5nO9HdsvlExDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 4196 msedge.exe 4196 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe 4328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4196 wrote to memory of 3316 4196 msedge.exe 82 PID 4196 wrote to memory of 3316 4196 msedge.exe 82 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4828 4196 msedge.exe 83 PID 4196 wrote to memory of 4508 4196 msedge.exe 84 PID 4196 wrote to memory of 4508 4196 msedge.exe 84 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85 PID 4196 wrote to memory of 1168 4196 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\66ec1a035435e307bb0d05225024f3b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba247182⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14153075860322188440,14457573600143448532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,14153075860322188440,14457573600143448532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,14153075860322188440,14457573600143448532,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14153075860322188440,14457573600143448532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14153075860322188440,14457573600143448532,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14153075860322188440,14457573600143448532,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD5427e977a90111056ebe6adfa0a7c5f8e
SHA14829e1035a2a0c33c0078f03aa4680a3234353f1
SHA256162568a35f84e79502bf320847fedec09d48848370503e9171a8ff0f743ea812
SHA512a45cd90c04fa92c48acf2cb517062fb769d559e6b9c10f7944ca2c0ccd3aaafdd1f51ade777ef0f3946e9c27b831ba52b31da7f314edf05791c6ebfff8641340
-
Filesize
5KB
MD5c470ec99a7076fe1d15e7a31065df911
SHA10e83c1b763a233dac0b2392e8bca536bf86697a7
SHA256feeaa4eff5be6b93fb6841139975b25bb92fd41a3c48c61b2552c22c096f16a4
SHA512d660da4bdfbd6a60fb14ace05efa595224192ab0f51f0bba377c68130e7c00d8d37b1c7e71a4a44f9d1e28fde37e116ba2ee4de533e122fe609312bd7e17a0cc
-
Filesize
6KB
MD54ffae0b02ba9568f42173ec4ce8ed62a
SHA1e53f77e06b6597bee1c76ddac3ab0647d16e304b
SHA25609aa0a7da77d56bd1694d5423fd77a6e889e1cf245f6e7057279f2f933389b53
SHA512e7dfd291633e7a9e44499ad1036aa3a2d86375fb1f2474872c9161d0eaebf01917a3c572dba0363ef769f296165ad96167b0feb8d0db1c38f5c145b8ece13e68
-
Filesize
11KB
MD56eb163c29d1c7ba09e24a0b368f438a5
SHA13ee37cb053b8b4fd6920c8f4eb4d7cd36279fe14
SHA256e66a5a0be1f90dc760b28d9926a329c3c5d4d651242ef61d24415fa0f7c27a91
SHA512558c8340cd575051eec773f884e2a2030ea7f56461a4061a0e153670ef9a4cf1f50d5c882f17799cd6c4db08c836501c4614cb56772315d2e7d3715d52e3c0fa