Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
f4f136c11fdb96ad131169bcac1e6222_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f136c11fdb96ad131169bcac1e6222_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4f136c11fdb96ad131169bcac1e6222_JaffaCakes118.html
-
Size
19KB
-
MD5
f4f136c11fdb96ad131169bcac1e6222
-
SHA1
3851b432512baf7f605841f911adb9e1060a63d7
-
SHA256
0367c08a69bd017282b1822999f2273641f05a7cfbe1c1cfe3c63fe62a9262fa
-
SHA512
c9b005be5906229d8330b473237e72ccc33bae8ea4d635a04f277868a2d69b80c6a929ad202ed26c4ec04cf23e64aabd2a4294343b1f096cd77ef7ea9c807e80
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIo40zUnjBhcW82qDB8:SIMd0I5nO9HhsvcVxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe 2836 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2836 wrote to memory of 3920 2836 msedge.exe 82 PID 2836 wrote to memory of 3920 2836 msedge.exe 82 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 3396 2836 msedge.exe 83 PID 2836 wrote to memory of 2976 2836 msedge.exe 84 PID 2836 wrote to memory of 2976 2836 msedge.exe 84 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85 PID 2836 wrote to memory of 2892 2836 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f4f136c11fdb96ad131169bcac1e6222_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f57d46f8,0x7ff9f57d4708,0x7ff9f57d47182⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,4168133752255731945,8182512823902400209,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,4168133752255731945,8182512823902400209,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,4168133752255731945,8182512823902400209,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4168133752255731945,8182512823902400209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,4168133752255731945,8182512823902400209,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,4168133752255731945,8182512823902400209,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\68bbc283-e02a-47aa-9721-57ba90bc475e.tmp
Filesize6KB
MD560ac0dec6fdaefad83d4a239a6776066
SHA177ee5405e9b4b6d3fda4dc2a90b88f8e98b5da85
SHA2564a130043fd98fd58267f4e71862a8b948876f9a3ce6f1a1dfd751c20ede4445e
SHA512e6b2caec707155f653c44cc062352e62f8b0845a8bf4468d909c49a2d32be6dee88dcd7f19cbeb78284ff0b7e736edcb9b6cb6fa46eab9cd8b4f20eee83185e4
-
Filesize
5KB
MD53d96e4b0b10b2b3458742af748f39f6b
SHA1ff218f9d3a1e497366fe7011e34cd726058834cd
SHA25622860d524b7cd0434ed2baf165f8b63c3f5864e08a44052e6e89cb07e5cdf034
SHA51238eee485e9103a63d04b551ef53d1afc341be427c9a8e2e08a4669f0da07607159e94cfa00e20a88edd64f067783bb7dfd0e54f8846db8b62c18db4621dd3480
-
Filesize
6KB
MD5ed8e63c56c29e2ea94b8310b9793668c
SHA1a86e2d2ef99e6c49342b6faac4d45ddc4fa9b734
SHA2569aa940d69d2d607664e106a2b4324e498931551a72fbd817c70c5c8d886e905c
SHA5124a5af9ef102cf7bb27100208c7c7090144f00b5d4fb57796ac6eabc09d0cc80a4861a48ade58cdffbfa33c0af8abf32fa08a72c3000152a9193a68551b327e95
-
Filesize
10KB
MD5ea18c4befa51a44f4af0015a877bb822
SHA19656bcdd1cf95223e2fd4401b1461501b6f4d7c4
SHA25625c381a30364b0c046748f0c63e620d23df40cce46889462e565e467ace3f8af
SHA51222e7a1f8e09c2eb6bc2e58bda50ed965cd29c8e54e15bab7b801f97479fb400888a6b5e45495f90becbf9db6994b9ab6bf962ddbf052bd675888725add48a4f5