Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
dd3c1abcb1705869b63e8da2adcd262e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd3c1abcb1705869b63e8da2adcd262e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd3c1abcb1705869b63e8da2adcd262e_JaffaCakes118.html
-
Size
54KB
-
MD5
dd3c1abcb1705869b63e8da2adcd262e
-
SHA1
95f3cc87bec29e66ad99d42aaea6e8a2832aacff
-
SHA256
e5e9966dbee3c0c6efb80ecaa025a450da7ffc0484a2de0673109cb68b9167d1
-
SHA512
20d06d078aa70011d66b8fd9f21d5057e783284d0a94bb7e29ceae8a59d3364a57b80dc202fa26c970665127388ee3542dd531d9f980808aca2dbc11ac27a8ed
-
SSDEEP
1536:aXbFPkj0y5s/Zp+v5OqPARv6PYqq6M1VWQML2S6W6PEGel8PA4/h:uC6Ei6PYUcVWQMLf6W68b8PA4/h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3752 msedge.exe 3752 msedge.exe 4828 msedge.exe 4828 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 4952 4828 msedge.exe 83 PID 4828 wrote to memory of 4952 4828 msedge.exe 83 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 4520 4828 msedge.exe 84 PID 4828 wrote to memory of 3752 4828 msedge.exe 85 PID 4828 wrote to memory of 3752 4828 msedge.exe 85 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86 PID 4828 wrote to memory of 4132 4828 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd3c1abcb1705869b63e8da2adcd262e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd76d846f8,0x7ffd76d84708,0x7ffd76d847182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17459366034289431180,8512625802386485203,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,17459366034289431180,8512625802386485203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,17459366034289431180,8512625802386485203,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17459366034289431180,8512625802386485203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17459366034289431180,8512625802386485203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17459366034289431180,8512625802386485203,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
1KB
MD54bcbfc010bd76996cb79e9fa1ea697b5
SHA10c30ae8222ee595a7fb919ec7cafcd1f94e0cee8
SHA256c4472377e8c03cab6e972247c3769556fa7440056f8a0f631bdf90395ef4efdb
SHA5127832b500526f93b2903bec2cc0fdc4700f6e3d1292df99143be86803aaa8ec549b1d6c29dafba10006708238b73a0ffb257a25158b4844070854cf5f7e327b24
-
Filesize
1KB
MD59f917da9eb96b7a26ca825473bd58bbd
SHA187ea19726639c032cb49c94e9c7def1bbefa0645
SHA2567737dcdc9361e001828290c5db112e269efd715ccb862db7fec9cbdcc66f6ce3
SHA512e13e87708d5c37d3d730205a78dad4053b8d2788f370b73c907567adb27a11e0107fe5d93d155e96569e57b358e896b2663bcf85c4deb0cfd943ea2c4c55723c
-
Filesize
5KB
MD5eb24670a470d9cf2f2dcce7e821c6776
SHA1c359d50afd89e9f95bc953fb0a162ad29b583a54
SHA25607b0cb149412fb9c07ed3c1e0636b81e30b4b2ff2532d95f84b5d1bbba883ed8
SHA512353160a1985bff1ed9d8f0b425f5c446a9e89d614ff63f72724a9d968ca01f4de5fb8d30101ac16ab247dce9c2ae7d5fb6d6a5ef10bfdce6a57ac85fa02a16ba
-
Filesize
6KB
MD5aa19310b9f3680ee9a8feeb9c6c4509d
SHA1602265a57e88582c469cde511c50c6a86a65c8ff
SHA256d6d876d6d35c5823bc071ef5f2d3f4c19f682f5b03b0c32fd1bdac705dc778b2
SHA512e68a029393a70a95abe9f37f32573a8493b89cd5a404c5c5a91ad400ab9560cac13c61d74395a7547bff5178a780d9c3d3a00ee046aadd7cda0e6b69003d17de
-
Filesize
10KB
MD586724c65832fc64d17c0e9c62fa642f6
SHA19a24f1edc2f2d3a8a7c0a71d53a6d06cb656fa47
SHA2567c091d11905dd1a33db09bd70c2ea28d4eb472a76614794fb7ea40fd3d5f580b
SHA512cc0c6f1734bb9306d01e8c3c9d8cf3ea47842dba4073fa84c4d532f65d230fecfe3a64c2afdac79dd4caa07e68b7dea0028b85cbd05e7aaa575f3c2b7012e6a0