Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
dac1415c83decef3b4e7199b05229630_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dac1415c83decef3b4e7199b05229630_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dac1415c83decef3b4e7199b05229630_JaffaCakes118.html
-
Size
192KB
-
MD5
dac1415c83decef3b4e7199b05229630
-
SHA1
196e08862b3a022757fcb8024a4ae48d72d70dc3
-
SHA256
59bd4bf08d72f0730c9fd5528043d54dc9c9c9f76e240abcea07c95bfa760695
-
SHA512
911c1444800a5d82a737ef1dda04768bd95a2b5e3d888e1a03839d4084c2f79626e014ea0f014b6bedb370910342a91c3392c11955e7708c0e426df33aa03adf
-
SSDEEP
1536:1xcPHisb59sWX0bVfDGU3d3dyV4S+f9QEhUX8L8CRwBEuUn:O59sWXZ3Vn+f9QEhUX8L8CRwBEuUn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 2228 msedge.exe 2228 msedge.exe 212 identity_helper.exe 212 identity_helper.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 3260 2228 msedge.exe 82 PID 2228 wrote to memory of 3260 2228 msedge.exe 82 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 2720 2228 msedge.exe 83 PID 2228 wrote to memory of 4816 2228 msedge.exe 84 PID 2228 wrote to memory of 4816 2228 msedge.exe 84 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85 PID 2228 wrote to memory of 2276 2228 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dac1415c83decef3b4e7199b05229630_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc136f46f8,0x7ffc136f4708,0x7ffc136f47182⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7464337803783758079,124810135649623855,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
258B
MD5f5ed4a5752cf6e0c4c36bee00ce95146
SHA104d898b0900b152149f16c6ee7c321a7469606be
SHA256d6d1356d75d6812ee7904a2ed1cab3a1637844dda278cdc47608bcde8dbd59f2
SHA512469bc7e671fb9919564233859a16eb8263919262f862014341a4f89cbf1fff9a7b8e6fc5a8235d076023e70731d612f5081c0ed8a663579f78563752aecbdd67
-
Filesize
6KB
MD53502178b56b5cc4f78e5f0fad071c1f0
SHA12e2bcdfa26afebded7657832614d4102bde9f04d
SHA25605bb64198ab5a40e765572b986299a76c72c5995350eb6c9c2536d297074d81c
SHA512bdcf163042f230a18ab148e59bf430e61125f91be86394738587e8d91ab0f33cb0cd89130846edd56a94b42b429f78563cfc3fee3ffcea9317d305d668ce8f17
-
Filesize
5KB
MD5095a12b63608f2e51db3472d80b335fe
SHA198bddab552755c352b8f7e81dcbc09bee4d20b8e
SHA256390c06be5f660726a03f25c6871137eb14e87efe85beb12104ef6661fa35ced9
SHA5129b9987d488d5ad24b6013aefdf2b9c6882b3e42d074a31536a75db8d1ab95bb46b14b34aefdf705cafb397db30262007f6269ac1beccbc229d110b108e65eddf
-
Filesize
6KB
MD5a7b76779efbc1c52bc5421de198b3cab
SHA1611ab39fb4f50ea904f166785b2b440918aaaf0d
SHA256af87b00b1b63684a98ae676ef96c57c8b18a6f38399df71bb3a8f3e55fe30ae8
SHA5122cb62ec1886cf23c60c654011a78dd1decd3df36480dd339bce3b36fbd8eadc55efe52c16a8a31ec3344aa4aed2ac790839428f9c4ef035f85fd97a0e9d17681
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56d9e63c4717e2f41de3fad4daedcfc49
SHA1397a71ab514583307fa07542bf2e0795981c7075
SHA256dc03a3225bfa38f3ea04a0859f8a537054efaff3993ed9e81f4a934b2140beef
SHA512b8f27e33a8d94a51b9353bba2a430ea3ab8bb9f2606a623f59e0feee4d82c39f92f9bcbb95a1e5d1dd759abcdcf606c6559c7fdfdb8136d11b0fd96b9cf95b00