Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
44404a984ddbf93adcbff8093a0b863f_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
44404a984ddbf93adcbff8093a0b863f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
44404a984ddbf93adcbff8093a0b863f_JaffaCakes118.html
-
Size
31KB
-
MD5
44404a984ddbf93adcbff8093a0b863f
-
SHA1
8bade979ff51c68bea1a2fd87745813d2bc95766
-
SHA256
04d24251cdcd581a6c8946190122c09447b35f5d2bcee89154e9a53d5d6672b1
-
SHA512
a8191766e611b9e65d83e840785e2239313b0d6342f001e1947ed5f25e144b5e5ad854b5acd724e4d4b7d4e66fbca773a6d96e1030379d86dd70c0375ad3ea68
-
SSDEEP
384:ACk3GDG7GaGNG9qG8GtdQ/gQCWS9SQ/jOw:ACk3GDG7GaGNGQG8GtLQa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 2748 msedge.exe 2748 msedge.exe 1120 identity_helper.exe 1120 identity_helper.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4652 2748 msedge.exe 85 PID 2748 wrote to memory of 4652 2748 msedge.exe 85 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 2668 2748 msedge.exe 86 PID 2748 wrote to memory of 3596 2748 msedge.exe 87 PID 2748 wrote to memory of 3596 2748 msedge.exe 87 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88 PID 2748 wrote to memory of 3356 2748 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\44404a984ddbf93adcbff8093a0b863f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7fff28d446f8,0x7fff28d44708,0x7fff28d447182⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,15157989698499801744,5674797217145021756,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5452 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
6KB
MD5b58361b206ea6ecf0e1aa924fcf1ffcb
SHA1fcfa2d4ae3289996a2b1dc84c7aff724ad42fdd3
SHA2568b0c89e3143e3288041a24cc89893fee0cef1cb40f6037ce1097505968d570e7
SHA51271a0a2c63d9e08893cf82942e25aca7ef43f37cd0e39f99017e0cb06b7add935c106e75cc0105ec927c7085a33e974c0337de81fc0c0da63096be89afe01da49
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e977d292-a390-43dd-ae01-0ea0cd01d557.tmp
Filesize6KB
MD592c1c8909f4c48fc48353b78e7a854a5
SHA10e9bc1ff411460a22869935ee4130b1a528fefd5
SHA2565f67f3d7d9103d93e752705647be9dd80bc9f429c1a08a700c1995276c8a306f
SHA5126baa3bd287d5d493a6b15b643f149eaad366942a138a54aa6e869575768875951af3732bdbf1bf7a972b2b18fe09c62306b702bae6ea701136e74081575d3274
-
Filesize
11KB
MD5730fb665a494cfa064f0419a2cf1eee9
SHA1de521fa65a6fa15e63d0a88ddfb4bd22731caeae
SHA256939003dfaa6b087a05cd1d028dbd7b76d4010553d77e98be566aafb4589fec71
SHA512290f77b1f1dabb873512efe88a82550ed815657ba133ed70979fda46f3a395313dc93647cd09a9bfb3ac1ccbdbf7ec84456a45e246f31f095acf596357d225bf