Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
669f74b420d28feec2b9b3d660b400d4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
669f74b420d28feec2b9b3d660b400d4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
669f74b420d28feec2b9b3d660b400d4_JaffaCakes118.html
-
Size
29KB
-
MD5
669f74b420d28feec2b9b3d660b400d4
-
SHA1
eeb185dfdf11b3a16333e65ff16e0c40d9f921e9
-
SHA256
11d60ad326228bdb4760a9138ff10bd2a7ccb2b33a1804dc2cc292a3764eb477
-
SHA512
14f66b95f4542bf41d80e33f4a663b21fd49010bca33018d8fca90bfff245df7c417dcd7729b78e19b91296e48ba0d203046051f271c7b11ac60a2865c924f35
-
SSDEEP
768:kQliXTp3iWUkDVG4VegHC8xQgMg9hkny0+wn9A:kQliDp3iWUkDVG4VegHC8xQHg9hkn1+T
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 1988 msedge.exe 1988 msedge.exe 4984 identity_helper.exe 4984 identity_helper.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe 4264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 404 1988 msedge.exe 82 PID 1988 wrote to memory of 404 1988 msedge.exe 82 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 528 1988 msedge.exe 83 PID 1988 wrote to memory of 2272 1988 msedge.exe 84 PID 1988 wrote to memory of 2272 1988 msedge.exe 84 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85 PID 1988 wrote to memory of 4712 1988 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\669f74b420d28feec2b9b3d660b400d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3fa246f8,0x7ffd3fa24708,0x7ffd3fa247182⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,17559946175968286771,4910735886384053157,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\59a89853-b04c-412c-a8b8-1d8fb59c26d5.tmp
Filesize5KB
MD508a0c201440393305d1e04c5cf0be916
SHA180bd6d944568558436f404960200370351458fc1
SHA25685d4264d9205030391f8c9ee917b410f563eb9c6f4f9c76359004535a10c5947
SHA5123f0a92f9530b4dbd928612ed70966e7cf801c17239a823f542571c05ddcc821f87225c259feddbf83fda759682f49cc8e84bd3a23583612f1cbed621a6826f44
-
Filesize
184B
MD545996eb12c5b1a531a2d9a3f56b913ff
SHA1c61935c0ab773fc8ca70f30b06620bd6e304c092
SHA2569f1f531b5d1eb3c957e2a57f0d59533bd7bb5da6f59e230b70b1e942e6dcca33
SHA51206455d33c060be6c22db298dfd4585f15d853d471e7ebee67e35c7fd2526261e400ca536cc3e3b3acf32175ea3b8ed41ee1c0e5bd3fa811e0217d1a078af42da
-
Filesize
6KB
MD51fd78fc0ee6f7f9c247568da92391bfa
SHA164fd2caf0907b125adc65b910140055e18534124
SHA256bdba30645c6e8a148f7ef195db82759081ec9777bc7a0c6918757f5d93322510
SHA512754ab192578644e4b5a92e4b007a6020f36585d774d3e0d16db945eaf44f7f5117192ebca5983eaf02e337e2fddee4401b57cea3f764766781fe197223198ad0
-
Filesize
6KB
MD58b5a04383362e02041d03fefa840e5b0
SHA196f53824bf6337180f63250f48b0d15efdcce084
SHA2561a0a94f7301fb7b1a808b200f35563c7c5a88d666dffd4e3c3300a0b367e8b19
SHA512f19db4a3d5b2d72689893d6d5bb154c7e4f5dfb449c51ef850216893850ad03e689fa489d1e7d0cec9a45cb5b767af680669f18d74b47451a0723f1ad0f99297
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD586a0fe091c83abf6e80a248208a7c893
SHA12b822e819ed801e4f9b864267e16b16e30aceebc
SHA256e3dfd5cfe518960e6c9b2011759f8a86fd4d19fdf42581934c17fb78c08aa0a7
SHA512ad11abd987e69c2c5985e9a1477377e75f7f2e4a6342a3229c08538526b2e74c206a41ff3fc20748c6dd5a280bde79eb342b0126279dc240e115557a19cb4d0b