Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
96926c39ce4be705a9bb17d622b18f39_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
96926c39ce4be705a9bb17d622b18f39_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
96926c39ce4be705a9bb17d622b18f39_JaffaCakes118.html
-
Size
139KB
-
MD5
96926c39ce4be705a9bb17d622b18f39
-
SHA1
02c6b57411a28035fdef2bb4311e5d539f56b5cf
-
SHA256
f838dd7c826bb7ecd6a0b4eeee0be4fd4331d624154a1d8522ce57b3dedc0df2
-
SHA512
396eefc3f2a1016854fccff1f11d24ea371c14ca0f099d87f4b481ca2bcfc1067ada69bee42d8eb0e145852db912a8ec7b76893e8b57d0bf63e761c85ff6dd1b
-
SSDEEP
1536:Szdf0e1lqOUyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SzYOUyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 816 msedge.exe 816 msedge.exe 2024 msedge.exe 2024 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3740 2024 msedge.exe 82 PID 2024 wrote to memory of 3740 2024 msedge.exe 82 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 4300 2024 msedge.exe 85 PID 2024 wrote to memory of 816 2024 msedge.exe 86 PID 2024 wrote to memory of 816 2024 msedge.exe 86 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87 PID 2024 wrote to memory of 4972 2024 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\96926c39ce4be705a9bb17d622b18f39_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab1d546f8,0x7ffab1d54708,0x7ffab1d547182⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,13919369321150120674,5691405311876564275,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,13919369321150120674,5691405311876564275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,13919369321150120674,5691405311876564275,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13919369321150120674,5691405311876564275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,13919369321150120674,5691405311876564275,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,13919369321150120674,5691405311876564275,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD53b6dc6afaf7aa7a97ef799a871c6d875
SHA1a9cdb25dc940cb87bb3aff20ae01637edd5aaf77
SHA25630418647ff960b288854c8c175eab68615f0a5009d8c9782d69fcc8c7e67b958
SHA512d35f04540867145ac0a3faa575ce07868a0d8843628b41ed184452fb44cf310ec499e89a7b6f73bf44a2cca2e6546633d0b7ea84f9419a23b1ca45bdd89a1c6a
-
Filesize
6KB
MD5de1da6a9cccc722ebac767dedbdee6ec
SHA12f8e768048f6e8c5c76a1ab80c12c3acf08fc87b
SHA2567409dbb440ddca06baf9e46f8078a945b5a226b724e7ac66431a3c329f3ec5a2
SHA5129dc295ba1e4a48e4d255bec987e6437a038223b7dbb944ee574d174dd9c72eed671d873affe00fcf86e432a197fed853938d564744617315ba7ca615ab05279c
-
Filesize
10KB
MD564f9b0caad150baf939303dded324c3b
SHA1b74bc786fbc60024010fedf3ea090cc8c93b9f6f
SHA25638a7b70a879e2f232579c581c4504f10e7582df99515a38a10c5babc44a6db13
SHA512046f622cf9a0ae1edbab35a1ecb3230f8c7f8d564f8ce5f7081d27114c1d5e339a2530e10d6fb694985c8f13eb80cb7307503a8fd1183fd94d5a3dc0883fbe20