Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
dd368af90fe1fb242250f6881b20b917_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd368af90fe1fb242250f6881b20b917_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd368af90fe1fb242250f6881b20b917_JaffaCakes118.html
-
Size
27KB
-
MD5
dd368af90fe1fb242250f6881b20b917
-
SHA1
5fa1cde27c067ea8cbfe148564929f9b9a6523cb
-
SHA256
282ac94685e196aa89dfa4dbd261fa268560cd6ca215c443a3f5b05c972acbb1
-
SHA512
ece0f1e5b4ea989730d979bea8112d4bec1e7d00aa7ed0a422406a7a0002b8f81d8576d163aba74ddae552178a2789482d8ca6835d88215788b1412fade29295
-
SSDEEP
384:akERviNRql8oAMBCNnUVp7Q/nxmgLtf6WdCQWRgW15+d606zgcSxanK1NKSTNOWm:CAvIVx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 4012 msedge.exe 4012 msedge.exe 4948 identity_helper.exe 4948 identity_helper.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe 1956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4012 wrote to memory of 1712 4012 msedge.exe 83 PID 4012 wrote to memory of 1712 4012 msedge.exe 83 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 2668 4012 msedge.exe 84 PID 4012 wrote to memory of 3124 4012 msedge.exe 85 PID 4012 wrote to memory of 3124 4012 msedge.exe 85 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86 PID 4012 wrote to memory of 1664 4012 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd368af90fe1fb242250f6881b20b917_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc100746f8,0x7ffc10074708,0x7ffc100747182⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,12423977892216335789,16761205992088295387,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD538b51c73e7c1365deff74848ceea6b40
SHA1fbde54469d39de0d55473e21c3a06e1719d316ae
SHA2562c033eff22a36b3e393a7f5d173d0b083cc25b60df7d044c2e6e3c2e1133fcf8
SHA512eb0414d547ae3cbd774ccdeecc8d18342a5279f4b9f379b06d91680ac383201c5375b068f5e4dfd6d65fe3af408e90fe505661f82f8b95790e79c8967014b28a
-
Filesize
6KB
MD52f0267dcd5abec77f605a5911fc1d203
SHA132b1fe042d1b8b4490a82cfad1a5225834d2a00c
SHA2560d6adc2511b9e0759b9a17247093a66387ad320aa7ca19eb1dc628c496b1f84b
SHA5126ab1a15bdf39fe53cbd9a08e1ee61330f5e315918f9955b1fa7dd66d64128468543eb099a19be774305bd267cd6d5f623274699caec98ad3e1ec2b9a2afdf458
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ee078a2eb4bc33334ea4ac4d26176886
SHA1f5137fe3b436beeec754456f5cce0f9a3d718c69
SHA256147d49a127381234a74fd7924049acaefdb5b834554a70219dd7933925b25f35
SHA512f32a086248e5a84100c6d0feb466fbb6e2e4b3e71b2ea97aa7c0559221da11d438a1bc56522872dbd50632354053d56b83b3b66b7b416cbb197b63b8ba66353b