Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
88eccb9c266f920acd55d657839b6452_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
88eccb9c266f920acd55d657839b6452_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
88eccb9c266f920acd55d657839b6452_JaffaCakes118.html
-
Size
139KB
-
MD5
88eccb9c266f920acd55d657839b6452
-
SHA1
3573a891b477d190569d04016987f545c43cde31
-
SHA256
022fee6475b224c57522ab7ef69cc70d8c366f2af110e8ed6d5adbf50df36b26
-
SHA512
954d3e215db701bff1414040edce9a41730fac83bbd11e59f4aa1c2102bda7cde8e783e1f9ad64d8b8979b183b78142aaf4fbf0705a505563d8a1f17acfe4e41
-
SSDEEP
1536:SOnybBbFluyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SOMBbWyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 1736 msedge.exe 1736 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 5012 1736 msedge.exe 83 PID 1736 wrote to memory of 5012 1736 msedge.exe 83 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3232 1736 msedge.exe 84 PID 1736 wrote to memory of 3776 1736 msedge.exe 85 PID 1736 wrote to memory of 3776 1736 msedge.exe 85 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86 PID 1736 wrote to memory of 3080 1736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\88eccb9c266f920acd55d657839b6452_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe730346f8,0x7ffe73034708,0x7ffe730347182⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10575692664119097522,7302779395382256675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10575692664119097522,7302779395382256675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,10575692664119097522,7302779395382256675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10575692664119097522,7302779395382256675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10575692664119097522,7302779395382256675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10575692664119097522,7302779395382256675,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD556b3cc860fc7d45ee3867c3ce8fd125b
SHA1f95b81dda5c72651358bef279ed48de2b9a452aa
SHA2569659e14ca05a259063f00e1be9d96868313774c593f8608f9f49e9cf53abd3a4
SHA5129b149cc80229dcf7396f30e0605709d8dcdb3ee1f90801734e12f79a086ade911fa9a7d9fd1a41ae1b72b5c96a3e4a3631004e426d31b0703f5c3385c8e8dcf5
-
Filesize
6KB
MD54947fc0a6e3b74a5c6618c2c181741d7
SHA10a609127b1d898f5da0028a6de87e1240b880a9a
SHA256232e599186e7b7a14ffb782e931499fab2621d11516cf5ae48ae7311e9d816fb
SHA512b1e49904f9be79fe09788eac96b87f6762dc19bd5c486d335c0626eed0f93cb9dbccfdbeced229becad5a022a444c3d49fd35b932a2d99f9e489085719409e6c
-
Filesize
10KB
MD5497d597c5c459c22aa7be65e5c2a7e77
SHA14eadcce7235251effca8231b8be827edfe395eee
SHA256bff6f98561213225cae4156033295fbb661c043339fb30fbde7d300ddd3efd9e
SHA5127c2ecb72c7ba38adbdee7e8dbc39e53f106766bd28c1141fab2ad3e778bf5c30169938f69976f72881ea1d4cf34973167afea7883712fc3e20a0a140737ac2bb