Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 18:06
Static task
static1
Behavioral task
behavioral1
Sample
dcc57036d00d2fee7b9b1fb3d783808e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcc57036d00d2fee7b9b1fb3d783808e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcc57036d00d2fee7b9b1fb3d783808e_JaffaCakes118.html
-
Size
36KB
-
MD5
dcc57036d00d2fee7b9b1fb3d783808e
-
SHA1
f44d739e3414cd10dc812e00b0c748dfdb80f788
-
SHA256
ca2d5149b318efd468254bd4f15df211ca75b90714a26a317a5fa63bfdf0efa6
-
SHA512
0aefa13f840916d64df05d341bbc7bf782ffaed6eaf68986d8bb1e5d37bb156fca061474210627362698028e5934efd5f300f19dac5f603147bc2028bac4c4de
-
SSDEEP
768:BFGUeijGuwG4FJJGOBY0Hsif4F9O4sM/i/PpOECjRGs:BFG9ijGfG4FiOBY0HsrF9+M/i/PpOECd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 4388 msedge.exe 4388 msedge.exe 3876 identity_helper.exe 3876 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 4172 4388 msedge.exe 83 PID 4388 wrote to memory of 4172 4388 msedge.exe 83 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 3732 4388 msedge.exe 84 PID 4388 wrote to memory of 4624 4388 msedge.exe 85 PID 4388 wrote to memory of 4624 4388 msedge.exe 85 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86 PID 4388 wrote to memory of 1104 4388 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dcc57036d00d2fee7b9b1fb3d783808e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff882f246f8,0x7ff882f24708,0x7ff882f247182⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8716518802698653000,17142836956056629596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2140 /prefetch:12⤵PID:4428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
309B
MD57ae044c546f78de1c62f7e2b1001ba02
SHA13acbb5b7ebe5141a51cca8b24b34b2af378f5029
SHA2566935f2bdd4e2cad8abd41f9eed4897084f2f70104f439357fcf4eadecf8022c1
SHA51247984c606031111970628161fd68c6fc92d1b4eebcb93d1a72ec3ae6c1ddefdc9b7a49205242a41ce8d6252d215b9fc9e44266a2e86124f7923341a1f3bb3d03
-
Filesize
6KB
MD5c1d6bfd524052bc57a0aaeacf8e36470
SHA11e61d94c5abe72e2d386ab25abfabd7e7d4cc366
SHA25655cea5fcbacf7109b1484927ce64ef9e41c42da3deb639cba6b346ab6ec78a03
SHA51275f02791a630705c0f8f3ec8539289de9fd0468ac263c5454bc4c41edc855a72ec6cbc12f794280b54fe65d507909712f804b886d4a52aa7a8c97f77bb2a33f7
-
Filesize
5KB
MD58f198c70afbe4933099176ec26df8387
SHA1802c2615cdd26245c4ea3126c44dd137f20efb8b
SHA256b7dcb7ab311c723ce22032d84b239fec345f786f02a40263dc011e5471b1e77a
SHA5122f261089132d9501ea7281b1427557151d611843ddda092e23f16b6d08a3030329f4bd6d86160d0dc233b030f8dda4d26c0df365db4fdec89bb596dbc1324762
-
Filesize
6KB
MD554311426ea3a8a790f030493cc2a1d93
SHA18f45d8bc35157986ea655d04c76065a3801325ca
SHA256c8b6bb0dede0e59417862e3934ed638ed7788131652b4d1fe42ef0f767f6688b
SHA512fc61155207ef5b09cc67da5b442dcb2494fef3432e25f0687203e4449f822860002e3f8c0efa92cec07fe905e5fd1dc08ef5d50b0edd0d8358938391cc9eb9bb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ca26a4e13a16a437b48583e56c5aaf9b
SHA137ddb8e101b7d6f6c2c1db252fa32299d6c9d1a6
SHA25648c677496b2bac8e3d26dfb448ca800b8f069d0be82b4cb9329f0d53d745c2a4
SHA512ba62ddc3fbf0d408baa05485e20faa973573c91897c3de1ba46a2b284297a545f258b2e87115a9702fc8a9a13c08393ff4042ccef6e0e55ca0d35282f7f296e0
-
Filesize
10KB
MD50871d0f451b2062d65a98cd3eded1dba
SHA19a154c99694038e0ab3b3782dfc272dddbdc74e5
SHA256d59eea87d5dfb65f0094f170760aa8d0d2609b92e71f84cd5d51f79b0ced4895
SHA512ddb13c24ebe12195d36421c86510f9b5901560b05f67009030e157951f6a6647ab167b32025da89eaada54cc6d617e08229917a52cf206ab3fd650ecf15bcc39