Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
20353573acf1ad6fd8f745bba13da7b0_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
20353573acf1ad6fd8f745bba13da7b0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20353573acf1ad6fd8f745bba13da7b0_JaffaCakes118.html
-
Size
36KB
-
MD5
20353573acf1ad6fd8f745bba13da7b0
-
SHA1
51763e21080af554be014dfc1da81a8e5ed6494f
-
SHA256
c60b34cfebdb255e4e05bc896169254187b8f8e2d7d948f5af786e884a505d62
-
SHA512
6f29c20a3572258c1c687304f7b09a8f899a972fe663d8966a28027b6d8919967cba65aaf944af5ae8f37170608f4c79c6fe0cf250a304c491eca0ab63bc0a63
-
SSDEEP
768:zwx/MDTHIS88hARRZPXcE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6Tsdi6f9U56lLRcs:Q/HbJxNVpufS6/s8zK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 4656 msedge.exe 4656 msedge.exe 3896 identity_helper.exe 3896 identity_helper.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4748 4656 msedge.exe 84 PID 4656 wrote to memory of 4748 4656 msedge.exe 84 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3116 4656 msedge.exe 85 PID 4656 wrote to memory of 3244 4656 msedge.exe 86 PID 4656 wrote to memory of 3244 4656 msedge.exe 86 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87 PID 4656 wrote to memory of 4924 4656 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\20353573acf1ad6fd8f745bba13da7b0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae8446f8,0x7fffae844708,0x7fffae8447182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2811406344151772016,14094258815488384522,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
613B
MD5370ee4f2a5fdf3f18fbbf694b30f1b9f
SHA182cea186a364f0f62b9028b0c9a59382cc45a088
SHA256a81e18abb33bb9468448090d632d3e01aba32b709de570c5b360114ca3f65da6
SHA512e7386645dd7b1008baabb24d8280b6ee63f0fea0461a3e9cc82b54362fa12210ace8581d37e2b380b830c9eb84d4e6b40a1b446f5856fd265e683eac30be1006
-
Filesize
5KB
MD5adc5423af3f9ba79e285cab5da48867a
SHA150d682c4065dba1e35b1d8a7427177f3a1b9356d
SHA25650fd1c337c84f5286be23c05388eca0714c04a6e5797f0f6ed4b32c01568496e
SHA512f43d394b87f3ea62a3337f892b6716ca8b6128f0f2ff23e5ee1de95e7a97150156dcd2afdac9aef908548253cde27fbf64ee72490395f8229bcdf2e22ede5707
-
Filesize
6KB
MD50a10838743518ba382364714902605f2
SHA19203c2028b0918777fd2b871a680b600d1c7aa0f
SHA25673be31779cfe6d38cdff9271312b45d5ab10311a6cdf22de669f53a47933d266
SHA51228edc51071e15ce6037835faced7be86940ee2d613fb69442d2108ab98f52fefc0268f48021470f1a13c038ccfd6251b835cbf27a0bce78e96216f86c3ca2b5c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51db63d2ffa929a2d59cae50a8b638ca1
SHA12a737df0924d71071fddadf381f8a2788f136d39
SHA256b30697d0c70429b7b527efd462f2b880c8d87d715d1f2bebc3b2fdb3369741f9
SHA51259be2f4b796abd986c1b22af8a720b9afee505d7f433054fe68599bd18896a833933c03320ac1095271cea585ca5ac93127ce680acc64259a8aef922c057fafb