Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
623e8e20b6658200eb88dbb541baa812_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
623e8e20b6658200eb88dbb541baa812_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
623e8e20b6658200eb88dbb541baa812_JaffaCakes118.html
-
Size
12KB
-
MD5
623e8e20b6658200eb88dbb541baa812
-
SHA1
cfc5133d2244369e2d67c259b3f73f2eb9bb3951
-
SHA256
9ed55779bd17ee7bf89e41cca86e834f11a7d7f0bb6717a27a7e40ab9ce5fd76
-
SHA512
a99b47ed06b37a15d0fa81213e9b680343d7c83cf4bd2957ce250b8c1bef4f0ff90aa0899a5eb895906c3637e8661cebedb6e964f62b4de4ecebf5ce9e7cd278
-
SSDEEP
192:PNDk0axLTBUFZBMC2AaKTTPYA1Ocb1ljbqodN57Y5i8onrpxq:e06XBULBMFAaKTTwcOinqO0c8onrpxq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3696 msedge.exe 3696 msedge.exe 4332 msedge.exe 4332 msedge.exe 744 identity_helper.exe 744 identity_helper.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4332 wrote to memory of 4460 4332 msedge.exe 83 PID 4332 wrote to memory of 4460 4332 msedge.exe 83 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 2764 4332 msedge.exe 84 PID 4332 wrote to memory of 3696 4332 msedge.exe 85 PID 4332 wrote to memory of 3696 4332 msedge.exe 85 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86 PID 4332 wrote to memory of 1760 4332 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\623e8e20b6658200eb88dbb541baa812_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6da846f8,0x7ffa6da84708,0x7ffa6da847182⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,3869435458747742899,844545403774096990,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
182B
MD5136a8627c9f4b9e2c7d3a90d2556f6d1
SHA1a0950a4a78f7bf1a4d08fe5dc8040d25e5e7094b
SHA25606d0224a7ed0c632fe0d506783ac4be33fdfa3c3b3b4a46dcfd4bbf0a1a08ea5
SHA5122399bbaeaf845478196f713f1e78c222568650d1cddaac47ffd82d93ef2a60d1cc7e40bed100afff0101713e70373793d2608f90e75e471f849888c19c88af1d
-
Filesize
5KB
MD5b0257d11a81f2b45b9d72e4d667ca590
SHA1fef9b7c3e4cc021b9fc7987d2c91e0237538efcb
SHA2560a227dce86d5843aadf2bfecc3e21813dc15f6d5ed20b8beb58155182da3b05c
SHA5121f515c62cb903b2b20effe369f81406957c47eea3f42dde2de56d97bdb6948edf5841399dd5e4f2444c86785c413a30be353b5801d547b24a36bea6ce9839e35
-
Filesize
6KB
MD5c008432c6e156041bb913f1f2299da75
SHA137260b476b1e523a6066c977adf4ccfdfdfb01ec
SHA256bc90d74742640370969fc45a6499a806e39f853e9627b738705812b2f215d6e4
SHA51218152566123a169ca4aa83ab290bf4b158b00ab22aa98a96166991127be1c1f9b1e00364d53d38c2b989d9bdc009ddf11985d840b491fec0075e03100bb6858b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59818ca8213ee407ba891d4198f5ef75e
SHA1ec84a9803e0914ac8432b52a99259e6019755a73
SHA256e0f49fda1303845c02cf6fccfc46887ae079b7f54cd86d66663f9056b3e9633f
SHA5123a214081d5afcbad8402dea987ff5659a7fda4fd0d7e3071140cb4fc90bc4acd42d009ad30af16500e4c3883fcf38aef22d1b526f693cbe9776b57da5258a1b2