Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
dd9bb97f951f36e9c803cee3f7998061_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd9bb97f951f36e9c803cee3f7998061_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd9bb97f951f36e9c803cee3f7998061_JaffaCakes118.html
-
Size
27KB
-
MD5
dd9bb97f951f36e9c803cee3f7998061
-
SHA1
03fef1d6e3375321069d55f9a0ece13fc5bf2b76
-
SHA256
eaf4f269c58ca579927c4013f7c0af0f60d6d7032d7e050653e2f0f503ae76eb
-
SHA512
da7813f9226de1d5bdf761d76b3c5df67f2e361af35bf2d99c8655ffa45f125f651f29d862188adf6c2405593cf6c7ff02b4df4152468c6a774687090a2246b4
-
SSDEEP
192:uwTMb5nnCnQjxn5Q/+nQieFNnpnQOkEntGYnQTbnVnQ9ed1m6uD3pQl7MBlqnYn1:uQ/VMPq3ASjUg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 660 msedge.exe 660 msedge.exe 4316 msedge.exe 4316 msedge.exe 4288 identity_helper.exe 4288 identity_helper.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4316 wrote to memory of 1264 4316 msedge.exe 83 PID 4316 wrote to memory of 1264 4316 msedge.exe 83 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 2356 4316 msedge.exe 84 PID 4316 wrote to memory of 660 4316 msedge.exe 85 PID 4316 wrote to memory of 660 4316 msedge.exe 85 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86 PID 4316 wrote to memory of 1424 4316 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd9bb97f951f36e9c803cee3f7998061_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff79846f8,0x7ffff7984708,0x7ffff79847182⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10542553469546319934,10279708817095457996,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD5f7a0388f283e94781e1001f5d6605e75
SHA154c17894834fe41d19c9c6e6f729dc9d3c22cfa9
SHA256383f4fa6f1695103d244a2a37832de43cba4b02a165091f306adf3884ee2ad98
SHA51236d65c161ebd412774ba786040cce1426b2a68563bece2dbea2da20d60be8184d2c161ef72e02516e35d6f04a563de70951f379b29fdcb17a657a4258ee5dc6e
-
Filesize
6KB
MD5eb3521637bbee09462cf6c6ade36dab3
SHA140fff6ecffbc672c5c5dfad285958915f431ea1b
SHA256f2dfd4c64b1bc5d8767828caa046c344d30efb5e5b9777c56931e98cc706d12b
SHA512ccfa603dabc03f3da6eb9dd3750b6ff3c26fc5e3430f0e430b85f28ea57dfa3f395da03b854e649c2573bce0e34ddf083fda0993853ed0a87f9b39e77b381481
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f9818e3b3a7a4f4cc2e92f21557b3011
SHA1f0243cbbb290ca2b41b5746d5aabc4376b219fb8
SHA2563b7a8a9fa1806fc96992c54b5f0e5ec1f308412eaeea2e08afd0a4f671268b8d
SHA51272afd3a9a87245d33c08bb8c4eda017a28e3dff9e2271e0c52c6f782de49a80988ad7123aa0a54946ed0737f565fd0e4e4f9380db61bac6b54bd5f9d451ee259