Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
7d3d283e760aa01e1324456c6f11b2a3_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7d3d283e760aa01e1324456c6f11b2a3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d3d283e760aa01e1324456c6f11b2a3_JaffaCakes118.html
-
Size
45KB
-
MD5
7d3d283e760aa01e1324456c6f11b2a3
-
SHA1
cd80067c5aa7f12c04e14498deb5e96b83b035d1
-
SHA256
79e24f3ad48339cd1e5405fb63c2c0f489132f509e80a7840442d28c07621533
-
SHA512
64d5ce8aa6c16014e76de52bcfb0ed3c19486ef25663e0edd1b6121c0e0cc13a4513c0eb7b5bd54447822caa3f0111c39e4beb2b0374308406aa7a39e5a4a16d
-
SSDEEP
768:x3MLcbLJE+V86kbkNFhZgFv6poTbMFe6WErUJ2Ew+qhdWQbws3gNL4v0lbh297kw:x8LOV86kbkNdg56uTbMFe6WErUJ2Ew+G
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 30 sites.google.com 41 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 812 msedge.exe 812 msedge.exe 4004 identity_helper.exe 4004 identity_helper.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe 812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 812 wrote to memory of 2296 812 msedge.exe 83 PID 812 wrote to memory of 2296 812 msedge.exe 83 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 552 812 msedge.exe 84 PID 812 wrote to memory of 3492 812 msedge.exe 85 PID 812 wrote to memory of 3492 812 msedge.exe 85 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86 PID 812 wrote to memory of 3304 812 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7d3d283e760aa01e1324456c6f11b2a3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb649446f8,0x7ffb64944708,0x7ffb649447182⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16238985658752766219,5202627896170360740,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD557d5cf132626006432ef7a44690c1d57
SHA17d4f727cee9dd014cc6f5fec78b969841e126b5d
SHA256442d990eca88c920f720bcb67632a08d0e4c7a3c277573ec573c374069845af0
SHA512b766a264b2e343adbef25f8500b776550cbfc6a84609515bf52c1872e1c6f51aae1db5dc24f51c90291127901f2dd193d3c7b15ba19a70a4073f4bbaf1a9ef89
-
Filesize
2KB
MD54adeda253101345df9246117b1138b97
SHA14a422312895a5873b6fef53f97c55901c36d46cd
SHA25677a8a018cd603dba2cb90bf9b2d9bd2351eb3250beb19b5b23efb13b92d80950
SHA512ab36e3c5ff5ccc5a79e9579b2c1a6bfbbd0866ba48db30697bd30f8ae3f31074f34f4f3af679c3193a8bfe0684bb292b001e7a8409626677fb2f0087ae6c7750
-
Filesize
2KB
MD5b544a717a031c1e83789d20da5f88a9a
SHA1b26f0e6241f9d005b6ae1a6b4a0d393e3feaa3cc
SHA256edd975e3786b4a6bf4066438f77180838c00423c7991db3a1884dd1258352170
SHA51293936bb3a374d684398b38a334825702c889ece22a5568330935cb61743c9a44bab6a08f7591b93a084b2f3c98684ff7a96986bb8f11d586b004f352ac8dd376
-
Filesize
5KB
MD544c4b7d7d393272ddbbe5e75ffeee5ed
SHA139e6525dff82b97cb2e55b3487446dd3815057f8
SHA25660f995c85c3fda7b39b456927108a3e508932b6f889eaf2dc3212359ac2cadca
SHA51263e5b9adccf860454dc0c4c88af266091bbef41c6d120b4919c963fe5e0ea1b34dd09768d3986300815870cc3fb233a7dc91ded2eb6028d4dfa279e13f1b16f2
-
Filesize
7KB
MD5207f26cb7f0e2562bb9cab7f217f68ab
SHA1301842fb6fa88069af53d89566e3e387e710cbb3
SHA2563700e2d248af6b7900f8560e96eda1363039e5d5c5a6ea423dcda1e9fbf64b0c
SHA512dcd0a36974cea0ef62d2742eb15d0e4f1020e3b816d1b45d80acbf27d5540da440c0c1c9ce218289e72e7b5b2d7f729d989b0b1c84b7db39c8637009d907c874
-
Filesize
7KB
MD5eb7a1a7cf14b4d603f516f74cbb43691
SHA1f943591be5b60533c47ce8b6642b00978f1f4264
SHA256b5d16fdfbf0b4aaa00e1a83930dd20c175b16571d32ae168a7670ddd3cc6ec63
SHA512f0df23f353fce97f8352b924bf2d554fb9dc3159fb9054183e2338ed2f64c7b3c75df8e7d04e73958dae4bf0e12352a7e4e4fb23c95833246484f16e1ccabe1c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c543d1672c4729891929913f348cfd62
SHA175bfc5af992e8c3ed1a6fdbb42a946d13a5ed585
SHA256fd1f7b7a33b0fe9e5ee64641b661909792896f2bff0932914aaa951c0028b516
SHA512b5179081284f54ce6623d8c9f134ca0f3da742364badb95e9835c8c6c01c89fc11a234a58ddb552c9f06054a127afac4e0f2748099b935a60b588dd39254f716