Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
ddf0d938ea67928f2620c587896f370d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ddf0d938ea67928f2620c587896f370d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddf0d938ea67928f2620c587896f370d_JaffaCakes118.html
-
Size
152KB
-
MD5
ddf0d938ea67928f2620c587896f370d
-
SHA1
26ae39b41ccdbf316546abcdcc34b4c71fdf22e5
-
SHA256
c9c0594e95eaf746d4f959acdc09d545a204a46030f711fcb8d5aa1c847450fa
-
SHA512
736b3f021e63928432c93933b051d95e74fd227cb1524ccaeebabfc6ce07c1abdd75211073f2d9f40bd49432dcc5a7c23384943f5677fa97fd2b47ef5b38c785
-
SSDEEP
1536:SLfdPs4pbdQHKHEPUeSaohKr9giEdehKtqxfI9hn51m/1njhpx+ISChhH4yUCUwR:S2SEK2ZUKshzFlVbg/P
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2060 msedge.exe 2060 msedge.exe 1220 msedge.exe 1220 msedge.exe 1084 identity_helper.exe 1084 identity_helper.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2692 1220 msedge.exe 84 PID 1220 wrote to memory of 2692 1220 msedge.exe 84 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 3572 1220 msedge.exe 85 PID 1220 wrote to memory of 2060 1220 msedge.exe 86 PID 1220 wrote to memory of 2060 1220 msedge.exe 86 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87 PID 1220 wrote to memory of 2220 1220 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ddf0d938ea67928f2620c587896f370d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b75546f8,0x7ff9b7554708,0x7ff9b75547182⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,7878449825288895166,14534124608406770878,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD53e6082bbc63c7c5ca4a6cd0d3b75b3fa
SHA1ef9076423ac4cbe9ad1545f1bdd8b85731a4208a
SHA25630a687466497be62bcaf2811844cfb6e776a6ce75959dfe089aedd596f28cd82
SHA512c22b5e4254177f3d83e0d6c6ae1a92199d46f47c0fb987811f79f776016b55a5542be7274c7385f263e1f40d9c60293f9f857cf88ce2c61f804f59e39bfcf2a3
-
Filesize
6KB
MD54cd634e82aa18d0d0f5792fd84d4f927
SHA11b0c79ecd875d1b38429a7b13f40ee2185a4fcec
SHA2560dd72852e868c7cde25246187e7985278a0818d6ff2d9f43f8e7c84d3b944d3b
SHA512e81d9d94cf8610af88da0c3700cfe7c49dd56b10f81dee436eed56533675b5292d437bccb81a116daae128b38e5e3ebc030f039b40af5f0d278df7567c9b748e
-
Filesize
6KB
MD5bb7f32ad9b07990d306da3a8b9866edb
SHA120d38c88c209d2c4cbf13d579d151ef7535f400d
SHA25637778d7f807c9bf0454f3e72fc7c204fecc793e480dee68f4e5a38286f17eb37
SHA5125f3b3d40f5107305ae2af64ea2713998b3bdf239f91dae13764be6fbfdc4229a5acbf488f932d4982012f8910a881d90cfac45e216ca1b3468e35d103f26ee12
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD547b2a16071dc5dba1c72250263d4d517
SHA1b80ec83e53ae6cf4ff18f9502488655e965c873f
SHA256b4a04ab870a3db1cbd0fd5c34cbd0c8a4d9a695c32a3c298e6dd03148327ee82
SHA5123f7f1ffcc7f7502f5aa91064a40cb020fa70eb51a0bfb1995e4dd5a7e22cc5b61167743adf7af391dfe58314b70fe0342855410485711744304afb7b098ec835