Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
23dd47bb726ad7a130de8c3237c80875_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23dd47bb726ad7a130de8c3237c80875_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23dd47bb726ad7a130de8c3237c80875_JaffaCakes118.html
-
Size
16KB
-
MD5
23dd47bb726ad7a130de8c3237c80875
-
SHA1
f003bba13e883d3027a820532bc865d2d71f7ee0
-
SHA256
b58fcebdffef85cc103d93271acb76331ae309f788d7952fad340ca2c7b613f3
-
SHA512
6c8d24e9bfe7ba627541edf38f0f67af135efa3322a3a462ab39e444d38520faf37a172e65a9a6eec5057be360e91ee4af370a515f94131cba016e51a41acf5e
-
SSDEEP
192:N930ze80VhrXL9fx2GC2ws4S4+sdjYmtTOEVSDT4yiWXJcrpRYlP1T9CUCKgfyEr:NPlVhrXLJ5jfmtTg9BRu8TrSn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 1568 msedge.exe 1568 msedge.exe 3140 identity_helper.exe 3140 identity_helper.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1568 wrote to memory of 4776 1568 msedge.exe 84 PID 1568 wrote to memory of 4776 1568 msedge.exe 84 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 4420 1568 msedge.exe 85 PID 1568 wrote to memory of 3700 1568 msedge.exe 86 PID 1568 wrote to memory of 3700 1568 msedge.exe 86 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87 PID 1568 wrote to memory of 4624 1568 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\23dd47bb726ad7a130de8c3237c80875_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae46b46f8,0x7ffae46b4708,0x7ffae46b47182⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3036 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1300 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,8022709978482821494,8064642230376425702,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
1KB
MD55cbd90a0a6c471e78e728e596eea572f
SHA1130144dad1612ebe1e60953afa8c40b4d016d622
SHA2568661638eca90addfbd5d7be5afd145e3f4a8ba0e07727b6f887546d2a3795b76
SHA5120ebf9f144782e350b47709c681ed4b2b1c5af67ce43a7c22dea386099dfcece0a768f6fdaeb09120805b6b81fdbac997740333ac2f93cf7cb30624e0b97da2b7
-
Filesize
904B
MD51267ec5f12738e663d30af9d221575a8
SHA166dc00232081b86151cf860c86c31fef455e5593
SHA256104802947f52b917c8cfdae56b1cd53cee02b8b712e9e0c4cd757e8706996527
SHA512d9f0fe5a43ceadc34128b6a6ff62a30db81f3471a390b978314e027f7db69d1b54a4d8eac3cc41780481412f5c1fe7493c3f93485354d8ac65eb39c35fa2b7d8
-
Filesize
6KB
MD517f30f944cb7005caa4b02f86e1b9da8
SHA1577399aec60a54eb0986f6a8d0f380134c0c36df
SHA256f633d8aa25dcf730a73d9896bd57fd7574be0b2eadc4006652a43e99fbf62597
SHA512781f8d030273e061d9a98f2edfe48a357df42aadaa66867dfff1fca068902de59e30a0f0996eb767144c30b653927e8961ee0c9df0094c0fcd6a4e2eab6b8d8a
-
Filesize
5KB
MD54f2c36161e8693c0780a52f8ef9f4a55
SHA184fa304543e8c5f23d397f5db5539ba8271f810d
SHA256de5db81245ce394853adf316fc0349f0adeb12ea7e22f2a1c39876a5f09dc36d
SHA512743f860a1254294cdb0c2165e73b5c21dc3f5fbf280d70206e07235c579d34b48e943ad912131819e607a468776d4255cef5807dde31a32f7ff2ad1f29865dfb
-
Filesize
6KB
MD5b4c534eef5711e2d079daa4475f645aa
SHA1cc2ecdd8be009d10f1f427c7030b1277cae16b22
SHA256dd92c1104053174025168917f0c26a38f925bd37f3ef05f607b4d5bc3a0dd455
SHA5128c9e8eec3560e5959fe86927dfa5957f4fe4ad937e3973b58bd5f64d518d8752d2275b87823c29b1db19b0007ac2358748126fb639c9eefe4c4f15a84c86d1dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD503d108a964987300e673e0371874bcf0
SHA1ba9102363067e882bd56b7cfc5c39b539f77c991
SHA256284f658947994dac6a61e93bab5daa014aa8f9c5d1bbd3385962b675701e172c
SHA512c7b32a56beec305c6eca41177f403d39ede47f55b501362fda1eb0542d3f9d776dc75bc2b944f3ff1093b6d8dc6ccb96c16e4e1d023381d2f32de75ccccd7b86