Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
7f99f8736dd116b90227081ec73b3f25_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7f99f8736dd116b90227081ec73b3f25_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f99f8736dd116b90227081ec73b3f25_JaffaCakes118.html
-
Size
14KB
-
MD5
7f99f8736dd116b90227081ec73b3f25
-
SHA1
03341daf03d9c55821d874f86fe27203cc7a510a
-
SHA256
f64f432e60da2e7eeec8d56e06c572c9361fbca83a3656d88cfc2e60bb339659
-
SHA512
bc94663d3b43703df3b43aa21fdf3a65083612b8b62d7d6e631ce56c6015322a6b0653dbb555f810a89da5009ed273fd506c42ecfae3095dc91a8dc37791bacd
-
SSDEEP
384:c+LojcxWVVolTTA9LgZ/WTMMJ8HYc+aq43:c+LojJVoZTA9PAM63+aq43
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 raw.githubusercontent.com 14 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2480 msedge.exe 2480 msedge.exe 3828 msedge.exe 3828 msedge.exe 1256 identity_helper.exe 1256 identity_helper.exe 948 msedge.exe 948 msedge.exe 948 msedge.exe 948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3828 wrote to memory of 3576 3828 msedge.exe 83 PID 3828 wrote to memory of 3576 3828 msedge.exe 83 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 3116 3828 msedge.exe 85 PID 3828 wrote to memory of 2480 3828 msedge.exe 86 PID 3828 wrote to memory of 2480 3828 msedge.exe 86 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87 PID 3828 wrote to memory of 3112 3828 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7f99f8736dd116b90227081ec73b3f25_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa439e46f8,0x7ffa439e4708,0x7ffa439e47182⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2600 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3368 /prefetch:82⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,15369032842006007657,12542227510061843875,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\989320b7-e1ca-4212-867b-3c55651e72f3.tmp
Filesize6KB
MD5e1c401ea9477dc5bbbe286110209a7af
SHA1b75e530195a6bc4ad1db009ab0d67b4f0566ae29
SHA256263d0946173fa5bd86d676f2c1b00a9360316677d59cc65feee5c7a1308c3e01
SHA512e60cd2bc80a184344da18881e70214b8e1994b7836bf39ba1bbfbbce126956da9ea37767d693063f665e0deba8a60776477046feff492e9a1b3c4f1465b59949
-
Filesize
708B
MD52337f37a6b981f5f08c8a746f4229c3e
SHA1336f18faa7f9af37193c390fef5825ba9d0d92fc
SHA256df731807b0f73c894313db9d0c59e96af5d136817745b70bec10bff54859c676
SHA5120e3b3741c92e206180d4f90f8e2f5ffefd37a7c5f0adb6f01c87ce8751417eb00f089253892176273a10ccc19919d3d8ebafef38814d7a47c75baa8814a3e1a8
-
Filesize
5KB
MD5a5bd55c4c1d8da1559178b66b87ba01a
SHA11386da8bd7e249571093da7be3f3af1cd52ee367
SHA25647efdbf2105ee5329bb95974c5b148aa4b25ee2421e117c58247aa5842c8083d
SHA512fea41f6c547443826e3974d7169c752c5153246074ccb814676962f5a809ebf9b2e85c0558286c68a2d30de400c6442dea1c38bf31a978a5b28dda4858d74193
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD53c382adb95148dc2af0459952acd688d
SHA1028880e915e7b0914e90c9b43ac66cbb087d7201
SHA256396cb33c0c4a3102a961134406ae2190f17a40bbcc8522f121526dc74f59cbe8
SHA512ddbf01b4e7b739a716cd394b5404736996f27f9540e9e1d7fc74c957cd6ea5395e1e1db0b96d6b70e13954e5ae13f6ec7de9b9118ac7867783b605465872359b