Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
890435e78b0d6d7f2ca3e150c96a431d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
890435e78b0d6d7f2ca3e150c96a431d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
890435e78b0d6d7f2ca3e150c96a431d_JaffaCakes118.html
-
Size
53KB
-
MD5
890435e78b0d6d7f2ca3e150c96a431d
-
SHA1
974d55135ae3693af57d47558b70fc751ab0891b
-
SHA256
13cb5bd0efbed14c1373235061e55e4ae83ae6f8c52eeda84764186a2593e8c9
-
SHA512
04ef09c80131f598f4d7da688bdd0a9930ef4132e99f0de7441cc98b51eca98e1f41f643b8a26256ead838742a0384013a0f04e5b5ac43fd5dbce6f27dadf144
-
SSDEEP
1536:fxq5BaRJbJ+3ggF9SlCceNrxSLT7v9qW6CEuH:pSBaRJbAggFRNrxS/7vMCEuH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 4332 msedge.exe 4332 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe 4332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4332 wrote to memory of 2848 4332 msedge.exe 84 PID 4332 wrote to memory of 2848 4332 msedge.exe 84 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 2016 4332 msedge.exe 85 PID 4332 wrote to memory of 3912 4332 msedge.exe 86 PID 4332 wrote to memory of 3912 4332 msedge.exe 86 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87 PID 4332 wrote to memory of 4992 4332 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\890435e78b0d6d7f2ca3e150c96a431d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5c0e46f8,0x7ffa5c0e4708,0x7ffa5c0e47182⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,3241992326715646599,2472428037822377710,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
1015B
MD5881d465f6a5e8dd439648a5e60ab0062
SHA1c994509b2df816afa68d2029442253cf903ce44a
SHA2566823bc31335337fa130c841067014ac77d8259725739f9aad7d6c5d48f39e30b
SHA5127e48bb58425dfe2ab3caa528870cf283ee8ec54c7dea397aa81d027776e47ba27d5965100897344c8646c71ac7f678641d4d26068b4f2a5c50ba28dfe800a7e8
-
Filesize
5KB
MD5081bf42765ad3bc0f0c803b96d38a3ac
SHA1aaf35b791b7bfc0d051e05c9184157a5bb0ab680
SHA256567fc4ec06cb08813c4acbcc7a4f831a4cf97be3c1ce9feb96b99075de6e53a9
SHA5128d748111a83bf3e1dbe67c59ef55eb4f067626cb00bc9a652bcfc84f17bee90b3bc5519455ba4d29af0171218373a857211564eb02eea8794884f343e4dc2bab
-
Filesize
6KB
MD5aaf50953c8a4552bebcd97a4bdfe05ab
SHA17ecc35a521f98f59bf6befdd7ef2ae40d1d556d9
SHA256c1bb8ed846b62ecd4e9f53058dbc8fcffbb090c90ef6c2d9335d10e13a35dfad
SHA512bc3968f17f1d16c99103b4125154bbd9be94794b813b160ab860b7d500df41092a0bdaac447cd7083bc5e7b32e8cc90611567d229ee4080b54bbe8aeb4476b1a
-
Filesize
6KB
MD5b5b2bf6ac333ddb22f5a5c74073ef1b0
SHA1dceaa3c0e17a01e4356caee6fd4ff168c00747f6
SHA2560a8354cf9e451beba6fa0107f3c121bf1fc214fb77afd405b7405722077ee973
SHA512461dde9eca3c3a37d45fa28beea74d07bd58813c76492cc4b47011b767e4c4ba46033e18ce0e4fcc22d91862423bf24da9e6a305f98fad92b169344f2dfcd6a1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5d1a7a43e820657712c39376c7282ae7b
SHA1f5a540e8130cafe148ad4d2041aa8f297e2de930
SHA256dfcd6d4db6d4ec169dc887a42e28abbfe9791036009ba48d2ec8fe1bad448045
SHA5127ea878e911a3a2f366b57e75fe743ddba3a46a47bc2f3d78dbe9e777af63c8468151d529e488fed1bfd21f4db55069d39e8fdbae262052aa541907d9a67b8ccc