Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
dde3eb3143eb2a9e03cdcaae65e1e69d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dde3eb3143eb2a9e03cdcaae65e1e69d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dde3eb3143eb2a9e03cdcaae65e1e69d_JaffaCakes118.html
-
Size
26KB
-
MD5
dde3eb3143eb2a9e03cdcaae65e1e69d
-
SHA1
663dc6bf24a8ddb9ba49c5c4dfd6bbc08e390bd7
-
SHA256
6d6becf30feda97f5025e4130b97c5d48770ea231747652436afda9225be1c99
-
SHA512
44894ecd7b0edf8c3f24b6ae55aff3f516e926ddabb96eb1961dea1ba67bcbc23331d6485e79703bb8d42e0ad50a83b01dc5af3dbf0a6905519c987ec039091c
-
SSDEEP
384:ZxXQ64LSrvo7YylKiDUhI2lRoXU2K+62PSGhtJUqxf7/TxJT1h66q1uM:7Xt8cylKrlRoXU2KMXrUqVJJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1332 msedge.exe 1332 msedge.exe 5084 msedge.exe 5084 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3680 5084 msedge.exe 83 PID 5084 wrote to memory of 3680 5084 msedge.exe 83 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 3768 5084 msedge.exe 84 PID 5084 wrote to memory of 1332 5084 msedge.exe 85 PID 5084 wrote to memory of 1332 5084 msedge.exe 85 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86 PID 5084 wrote to memory of 2376 5084 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dde3eb3143eb2a9e03cdcaae65e1e69d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbdec46f8,0x7ffdbdec4708,0x7ffdbdec47182⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14187680521790984725,7445650244026953676,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,14187680521790984725,7445650244026953676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,14187680521790984725,7445650244026953676,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14187680521790984725,7445650244026953676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,14187680521790984725,7445650244026953676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,14187680521790984725,7445650244026953676,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD57c34d3d6126c668d877d2cbe7b3bfb3d
SHA1ad6e92e25fed0c49b4fdb2dc3ff77594ab135675
SHA2562460b8d3bce94ace88b46be3df1a593fa800859f01e671879f58961ed929adbd
SHA512e50a7d8d1d809f9c870a59f31b5a7ba24bacebafe336c80ad997ad7c267797e5c6e37b3cd4f1cdd0a5883525b2a6cbdfd174e6615e6fa42ca98c4b0a17f05ef6
-
Filesize
6KB
MD558fc0b5678dc5487dc80b9c677ff6626
SHA1d0ba9b0d278032a8bc1f38deca7b0597bf153f4f
SHA2569b562a537cff9e57d7da7c9e6eae7c75ec105cccfab7ffab289a3418f40cfa12
SHA512b80fca78eeff9081de8c971604a4abedd75a07c7c05ee4aaef9e6e4a47ac30a16e703b8492a3784cdcd437f6c4fded254c86a290d7b0382389be0fb8666a3d7a
-
Filesize
6KB
MD5d7b1f0a886e26f69857d51a79c7806b7
SHA18a3e90147151770a8fd6a11906ebea0df542242d
SHA256dafc7365036db205b8d983c6dc086958578ee6c3cd6e051f7bde8e0a5c1406e1
SHA51250f969223db5ece678170557c5354dd905fb21a447cbe8552ee87fe49a5452767005bbf123d17f193120d5c274f8b227862b466e566b729d661fe8a7c31d1162
-
Filesize
10KB
MD54d7efffd32925170053c01c80e9115da
SHA1bf6989e6acd737986f9b6634d181dd69fd34aecc
SHA256806edf6039196d8818ebec410b91ef09b8471190b45806698efe1569138d76dd
SHA512f345a4d4802bbfd72a838da543f24468c75e2ed9442442f5ad2a69f3784306873c8e15a64e5c1e0766ad0268e5c19aee967ed9ac418372f31631c6daca9494fe