Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
dd4de05e788bb01b100ded9e03debd3b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dd4de05e788bb01b100ded9e03debd3b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd4de05e788bb01b100ded9e03debd3b_JaffaCakes118.html
-
Size
75KB
-
MD5
dd4de05e788bb01b100ded9e03debd3b
-
SHA1
1b345ba827f93c5a547f0af123e98d7cd7742ec8
-
SHA256
85c2fa646c7440b0ac23075b312caf4e61be2d9618098ebbc6dbd98d9d47f19b
-
SHA512
eeb4a2a85569ae5a56551e7b6ab74818dedfee243084ae015e406df2bb3dacd03f673d630f17f5903ecd1a87230b6172b9369bc86e2d9f83eb4fc2a865b07e69
-
SSDEEP
1536:jIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZHZM:yHZnXLkyw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 932 msedge.exe 932 msedge.exe 456 identity_helper.exe 456 identity_helper.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 932 wrote to memory of 836 932 msedge.exe 83 PID 932 wrote to memory of 836 932 msedge.exe 83 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 60 932 msedge.exe 84 PID 932 wrote to memory of 1344 932 msedge.exe 85 PID 932 wrote to memory of 1344 932 msedge.exe 85 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86 PID 932 wrote to memory of 2444 932 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd4de05e788bb01b100ded9e03debd3b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf89b46f8,0x7ffdf89b4708,0x7ffdf89b47182⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,9904790824353573848,3583246490361864806,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
308B
MD57ccfdc12aec8a1410685555b7f3aa7d6
SHA1d0726a612a000b3a2f1f3e81d543c86ac97bd801
SHA256e54c3d00bc9099a4e4461fabed90f3f5e122816719f114dd9613c98fd8a48380
SHA51254dd20685d042709cfdea75f21287daeaaa6112c2484bd83efe2bb0501fced07b896770a45d1c9fa92c713ed31cc61aca934045bd88a84773d221159b9e883be
-
Filesize
5KB
MD54031628bb9d904b733a8eab51fa9b306
SHA16b624bf5e86a4b56dfde5cc370f32ff2521520d9
SHA2564045a0adaa9a1e5393203c562994f9400c9b37c1c5914e1f3687895a6c0da3ae
SHA5125a02fa75dc4c6b1f5da916234449d0b16e34cc7256b402ca13761fa156143c572ef7713ed3b8a7538e80de44fe863b35c18bb2d084c666f0ec050aac0f32c091
-
Filesize
6KB
MD5f26f15e9471111771bab667ffa7622c3
SHA1cef044af14ac3c33e0e883532a47b2f5ce413730
SHA256ed497fafdf2632e4e783fe610dde73f964cb95c80b47d91743d0e4438cd5739c
SHA5124e57fd3a491c5d1261ac4233ee573f9c6cec73671b79ea70dbb72b6e65f6e32686551f4b8db3f0629d4bcc38c37497215c3c5b823ffe1186b3261f58da32a562
-
Filesize
6KB
MD5adba17a5856625cd9adeea7b341f138a
SHA140fb37af8ab32c53307e1d8731b91ce4f9a3a781
SHA25603e5bb9850f3e1ded9e20dc9866b47340942655eb3465bf104956cd557afaa7a
SHA51222a71a21c92fe322285f4a7efe44ccfb6227411f4b14e2b97e0b9fba318d0318ab302e754b6a125192d42c5ec55e806fa0df157298f7b3805562c501dc0dc3cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5608e520d3deb892695cc7f7635373f07
SHA16d12e4f35c36620d11b4585740854d49e45098cc
SHA256b42fe2e516e64dee84c7bcc0c8f82c2c3774a9c45b8d60e1dae61da07db11596
SHA512bdad5a6199a5495bec9eea205176a61715e01372177c80f6989f6194ee7e804383cee69bf3ed809809eb9185b29718261fff73a0f3abbfa644350cae5b4fd3c9