Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
deed2f50576c18fda5a165511d9430cd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deed2f50576c18fda5a165511d9430cd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
deed2f50576c18fda5a165511d9430cd_JaffaCakes118.html
-
Size
27KB
-
MD5
deed2f50576c18fda5a165511d9430cd
-
SHA1
f5bcd8da90183b2861fd1423cce9016813f72d98
-
SHA256
76084ae869a25be56ac35c0aa6253480743ad9706ecfff2bd08cc58b65bc5dca
-
SHA512
7d90020bb09a01be5ca7607627c2038006ca61711c2a952fcaee6f8405f04e211842cdd81d5e8e5141028cf308d94a635002e10b323c6135652ce42d86489677
-
SSDEEP
192:uwafBYncb5nOenQjxn5Q/dnQieV6NnxnnQOkEntrjPnQTbnxnQ9eycm60e51ympX:TQ//HEaYpSqlv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1012 msedge.exe 1012 msedge.exe 216 msedge.exe 216 msedge.exe 4384 identity_helper.exe 4384 identity_helper.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe 216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 216 wrote to memory of 4160 216 msedge.exe 83 PID 216 wrote to memory of 4160 216 msedge.exe 83 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 3984 216 msedge.exe 84 PID 216 wrote to memory of 1012 216 msedge.exe 85 PID 216 wrote to memory of 1012 216 msedge.exe 85 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86 PID 216 wrote to memory of 3292 216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\deed2f50576c18fda5a165511d9430cd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd3eb46f8,0x7ffcd3eb4708,0x7ffcd3eb47182⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4112 /prefetch:82⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17078136866979087237,5140953274901132941,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5236 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD559c99e1d5ed0447d0b5143e3f045a39c
SHA1e7a46edb725d9162b990ce5e90d14f1194dea479
SHA25691c46f5a9f3164c0b5cd3db7e204ad060e714e976d687ad979817d9053a7f023
SHA512d48264b1ee496ee8abceb3ae76c342f375e5b7e73266da1e056eb65ed3664c9af75fbed2b60ac20a8c43e3aa44076d0a37735b84c5599fadd30219c28aab1da2
-
Filesize
6KB
MD5d371f8882315a7ed9fd0d922e40b479e
SHA1d41fbde7521a3e17380c81218fcc0a8d3237176c
SHA256b7ebaae4e4985200c43cb57c5bf916bfd5a0e1c744f30e8b82a49c559d2f668a
SHA5122a73eb4985d357e8f5b1ddfc21dac44a380b501f0e57a8ccda36733c02deb1b1dcf8866494b061407c220ee8c1cac1d7848ae3c4544378f3e2f0c89a98583125
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5db765de036c1e30ba4c087e7f6cb2467
SHA1b45fe363c5960aa7f0547a2e13c16370879cfe91
SHA25684c8111dfa53572f480ad557a476302679136e8ea5160e4557ec984f5a21695c
SHA5126aafdcdde2127087b3cb84631617a095fb9d347872527db6d1c7b35979af41a7f86ac0b04ffe9a81c92d4d0007ef9fb66df19efe3072592398dea90cf3b40afc