Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
7c199c49dcfcb726d3646eac3230cc30_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7c199c49dcfcb726d3646eac3230cc30_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7c199c49dcfcb726d3646eac3230cc30_JaffaCakes118.html
-
Size
18KB
-
MD5
7c199c49dcfcb726d3646eac3230cc30
-
SHA1
3184c57d9d090a681a6f57d10938b270ca1991a3
-
SHA256
c9a22b6870274906da038d21a24688ac0edf7af6a8fea1fbf40a64bb5cf2fc0d
-
SHA512
7e58727cb1246a1b4b0cfd69ffa7ca141119fdd8735d938430ae363dd379fd5aaa8032eeecb83b5a7d63a4e0b67d24b54f71ab4ff2f93ffd5058f94cd606f4e1
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIe4szUnjBh4S82qDB8:SIMd0I5nvHnsv4hxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 2712 msedge.exe 2712 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe 3716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2528 2712 msedge.exe 83 PID 2712 wrote to memory of 2528 2712 msedge.exe 83 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 5104 2712 msedge.exe 84 PID 2712 wrote to memory of 1412 2712 msedge.exe 85 PID 2712 wrote to memory of 1412 2712 msedge.exe 85 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86 PID 2712 wrote to memory of 2812 2712 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7c199c49dcfcb726d3646eac3230cc30_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea6ed46f8,0x7ffea6ed4708,0x7ffea6ed47182⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,2158479492633697732,4086018025553183688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,2158479492633697732,4086018025553183688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,2158479492633697732,4086018025553183688,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,2158479492633697732,4086018025553183688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,2158479492633697732,4086018025553183688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,2158479492633697732,4086018025553183688,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD558503d2a8576abb9599a52602d520bfd
SHA166ca8fedb3170cd46680ee15ef90e0b9a4c81c6e
SHA256747af2d29ecb3961bb3f1dd092323c9ed918ab004f48a516fadaf7fdcc18d038
SHA512994e76f8da08c631353a42fd08eb232808b89d566721215866908a25fcfc5c0203eebabd782b6846af580308d8f5593ccc385ec0057403f5a591b7fc7041f153
-
Filesize
6KB
MD5d5109c1f0ca38eea3c134151546d2787
SHA1614e3d293b03c44bc3b62d700904f95316806e78
SHA2564f7f152d5d07ac6f594c00528651a326d7211f808ef7cd25b6aa010e859cf8ca
SHA512b35ff1c3bb0629c9195c3d25e8836f7fab28f1a647b9f8ffea57f7f05b293e7fb7fd85712894971de7083fd031cec77f76cd7d04cc93c00fa4c09fee0a8747c9
-
Filesize
6KB
MD5930d9b88259a9f97fa7dd7621aa1da3a
SHA19f5e794c1859a62d6a33f793764c56697ec10e85
SHA256d4f81850b85242833c2ffd6fd69ec540405c6d6ba1c922f098463dfc79d63bbe
SHA512fd1d568fb627b5b2a1f930d0c7c87e67ef51219f12546fe9bcb6956ad5f681a0036c0c749196506a3d7cc9a386d76a293839fd6c3e75e32e2c6d0aa1e11faa4f
-
Filesize
11KB
MD500a6a87baeed3ff122177e063687e0f6
SHA1f0fccebf462079d95a0dbab40991d41343cf66e6
SHA25687b805bc5be8aefb993b098efd3b15f777e75b355d2131b49cf965e16c0ea064
SHA51220b2fba78758d1854fba57d5b70763123f6a0ccf577032b1cad1508eb94e56d1b9f830443b48c1a81b322deaaaa6f0bbb3f88099e4e02bf9146d16309b7309ad