Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
776527c4fa856a9c2a225f0ce7fbd50c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
776527c4fa856a9c2a225f0ce7fbd50c_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
776527c4fa856a9c2a225f0ce7fbd50c_JaffaCakes118.html
-
Size
140KB
-
MD5
776527c4fa856a9c2a225f0ce7fbd50c
-
SHA1
a6ebe7bf852d55fae17e0a6b95f6df8056510792
-
SHA256
68b6ca7f175565ec649ad7725215495c0aab47ba67d37de42d16ae57b64d6c9e
-
SHA512
4939999d150b744b425618fb37761e0517b8280c135fd0bcd041f98996184cbcd51fa73c6daf95b74e5088bf55ab3f42fc5c564c14075c7ef855d349027a5989
-
SSDEEP
1536:SUpP6zt6K6ZlIHyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SU1mtc8HyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 3164 msedge.exe 3164 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 5016 3164 msedge.exe 83 PID 3164 wrote to memory of 5016 3164 msedge.exe 83 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 4112 3164 msedge.exe 84 PID 3164 wrote to memory of 1668 3164 msedge.exe 85 PID 3164 wrote to memory of 1668 3164 msedge.exe 85 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86 PID 3164 wrote to memory of 1548 3164 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\776527c4fa856a9c2a225f0ce7fbd50c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd8946f8,0x7ffdbd894708,0x7ffdbd8947182⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,10557324564953259234,17672732277865296735,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1892,10557324564953259234,17672732277865296735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1892,10557324564953259234,17672732277865296735,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,10557324564953259234,17672732277865296735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1892,10557324564953259234,17672732277865296735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1892,10557324564953259234,17672732277865296735,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD54597f69cd1ca5eb312347fb179570e02
SHA1aaf6884452b66b264725995c236775812913947e
SHA2569304df4b8d235f7791cdda093a1bc32c87c43bb15de0b551ffd5c29bdfe2422e
SHA5126a2eec4e945f430b703c71093d4ba697e20ca3ff099ab78b1c530d3823c648db428bb365f0cd23c959821bdeaf977557b057a38d70a6f1507afc3a3b78fd03d2
-
Filesize
6KB
MD53e50248ecb21786243db172f569d59b4
SHA151a77640b238c5d8fa260382e61f34d75b2dcb1b
SHA2561b65d7112106324a2114ac749e13c4692ee95c801d9fe607ea1fb1012d0fece9
SHA51282d6372c32c4e60a81acf7b01be2d8175787ced74e5f7db51d1309e8c7581625287f4847ccde460e3d149d27a0e65151c4379a9582b33fa50d56c5af504b37ce
-
Filesize
11KB
MD598a046466fea0291a14ee308f4b6089f
SHA1c70da92335ed825d18b51e2c542ae21d4184f5c8
SHA256c3633f2aacb3d6483f1671afb50e746e34c983539d41594cfc980983c1abfb3e
SHA512fac8f17e484d5e1cddd985739b349b26d7382ea63d5920208c8cbdc83e05fefc8a7c2a18e10e18704c0217fa20396fcb4e626b3a1ce0a75b3f4487c5b54aeaf9