Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
67a1bb37c3b79496082f2292d5d52ee4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
67a1bb37c3b79496082f2292d5d52ee4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
67a1bb37c3b79496082f2292d5d52ee4_JaffaCakes118.html
-
Size
62KB
-
MD5
67a1bb37c3b79496082f2292d5d52ee4
-
SHA1
89e2763980b455c1d85bd54ee0633803efbb9f65
-
SHA256
cda4a1f6eb4a5e7614dab1fd3e442de2fb0a4d3ef0a5a0fec44170d3df8c499e
-
SHA512
e6fb377c42dd7da2578ae1e53cbe40cdee82a86dbf0efdd086c8814ba4098b45feac09f024dd51678cd1d13101b59f37e4c02700596883c671f647d29e494d6b
-
SSDEEP
1536:4Hv7rHXN0ycyRy1yuU+4w4m6Kr9QZNC8Gy2+NHpYrVVh:4HTTr+Hr9QZNC8Q+NarVVh
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 sites.google.com 28 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 856 msedge.exe 856 msedge.exe 996 msedge.exe 996 msedge.exe 4468 identity_helper.exe 4468 identity_helper.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 3380 996 msedge.exe 85 PID 996 wrote to memory of 3380 996 msedge.exe 85 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 372 996 msedge.exe 86 PID 996 wrote to memory of 856 996 msedge.exe 87 PID 996 wrote to memory of 856 996 msedge.exe 87 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88 PID 996 wrote to memory of 4208 996 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\67a1bb37c3b79496082f2292d5d52ee4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa445a46f8,0x7ffa445a4708,0x7ffa445a47182⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1312 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8005541308324970357,18440897083652094109,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5340 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD59f320437f91347aa9a463417fb00607c
SHA144f0301655c42ecf76b02d587f0748a81cf9e940
SHA256b90f0ccfe98bbc469e9fb1dc7b162be9e1bb7c9017b9726fe538778c06a86ace
SHA512d1226b586c2a370881f16235bde06ac294e73cfe410099ab2775abf54b481867e18c1c82a7f06c362110281f9dd6190fcf37454678cecea8a1e28f2ae925600f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5104807e2c29b0a1dbea1aaa7054b2ce2
SHA18c600436bacea3ec8b415a98d729ad3cc08b029d
SHA256aa02acc2dbd9d4f24d2ca19985be0af1c71ffd977bdaadff1eb2a91deff73d6c
SHA5122745ffee3391362ad30cdbf4421d3e3a494c45a64808bf362228a6103a3dce194c779f0d124f6d8b9a5630f73b2143064c051984f44ffbeeb4054f208d771421
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
96B
MD5992e8f2100fe7451f37ce2e3a74be1b7
SHA1b40de1a5b1847dfea29ecc8ad17e6c7cc1059342
SHA256afc5cfab6581a99644ac5545d726077c6f96bc3bf2d1aeeedf3f6f809e17eba5
SHA512e86a9af958e319e99059b8240e4a661e098e46e98932bfe5e3a4c90b5974a85a1bd3e406def9bcc41e5173d6a4f62b5c9e9e0b30319c19f1006db8e894c0a666
-
Filesize
2KB
MD503adac58c7e5c26c4c30ca5b2de9af50
SHA15021250ae3fa2f350193eff625b065712ff08205
SHA256164ed7fbacc9524d0f4b65d626b838f7e00956b4259d9b830bbe572be5eb1e6e
SHA51208a9f57fba77e61a96d5794c3370fd977309fb39480b33ddc225365cda59b44193316a6fe2f792aa2a4ea802ef419f02d9e8c3887da2024837784620499c47cc
-
Filesize
6KB
MD54ecd5db9adb00edaf97ab639fba9deb6
SHA1de36875f80039a54c189c4402cd3e949c323c90d
SHA2569445463903746c69270a1b54191035c4b4f8c40379a595bfe25101ec04b5e82f
SHA51254b4b2ff187fdb2705c00c595c59d986f3f5897846f71ef1cb99ac69ee66c19c71c4fdf9936e1621518e011f4cba2d80581a2ea77047eb98f75a4a28b530b232
-
Filesize
5KB
MD5302668d6a54f3adb0e0a88c2f2ed784a
SHA14badb36491afc9b3dc876764f3ce73cd78e20599
SHA256785d879c68f45eec11807ea1db24493f32855d8e9d2d66b82bd6895a667728ab
SHA512a874b1e102d7df43543e1a94c8937e16d4cf76087ec98002e918f78261b25af8714728c71fceabaff8079708aeddccdb0273e88d37175575ff7a989414867714
-
Filesize
6KB
MD59a66d8892a2001841650e0aa18573e39
SHA1c8c1d90d7b4cccd2794adfa1ef1441cec0a9d35c
SHA25694e5bb3c62313358ee0605665f506737c8819d350bc0fb3d97e952f2837fc33a
SHA512dc06f7ff5ade85bb62ad27d0bc5d94580732c53e0d0191a9f5354fa6c31f2cc8f0d2448cdedb7374a2fd9697ab9f70d72b075088aabf5cc14948a298b261186b
-
Filesize
6KB
MD5678d351ad224ef587f4b321583a9e74b
SHA1cf47acc091bc27c236927a7ccff8f3717968421d
SHA2566d3526111952488ad4640b730fd9959550ecb3445ecf3bd873ccdfd2a6e3f8c8
SHA512c611d9eac81ae8b50cf0a60ed0cbb5d256bcf80a68cb3e2508c90bcef830527af0bc772aa1b414e50c4ad836b1c42dec5f817718ab2e17bd12d9e90c00f7cdee
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD527cabeebc37d4bbc48b38e751467ea32
SHA1049c151dc34dd736f7c7ae949ba311a4f4b6a445
SHA2566b8dd1ffadb382621bb02809b283e32afc19de9e994088144891e4fdb580d106
SHA5123ec224f771fe4ea034f1e4288e1cf59bc38c82b4714ebb4fcb247130ba150fa6587443a19d39afd87981c41b7a5bac978f9084c7e813a4064d2a4b368d9a248e