Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
fdf248d25ebaa229ab62a512e7d23ec8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdf248d25ebaa229ab62a512e7d23ec8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fdf248d25ebaa229ab62a512e7d23ec8_JaffaCakes118.html
-
Size
4KB
-
MD5
fdf248d25ebaa229ab62a512e7d23ec8
-
SHA1
1648cffc28af1913672ca44c572dc7f461202e52
-
SHA256
74747305074915f89991a05621317f126d4c2368216cdf41cb75cbc234348511
-
SHA512
87e24f0609dc3721b9f82e85602c55af2fde335c862406ec432d83ffb95a192525657938df18db3734a8286929e67015d7c59887a53d48b541899b018b9687d7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o6F3e7Wd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 2024 msedge.exe 2024 msedge.exe 3992 identity_helper.exe 3992 identity_helper.exe 1132 msedge.exe 1132 msedge.exe 1132 msedge.exe 1132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 4920 2024 msedge.exe 82 PID 2024 wrote to memory of 4920 2024 msedge.exe 82 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 4788 2024 msedge.exe 83 PID 2024 wrote to memory of 3364 2024 msedge.exe 84 PID 2024 wrote to memory of 3364 2024 msedge.exe 84 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85 PID 2024 wrote to memory of 2256 2024 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fdf248d25ebaa229ab62a512e7d23ec8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdef0446f8,0x7ffdef044708,0x7ffdef0447182⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2837691447915847463,14275495199118132520,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
292B
MD5948f45638a80f155b8727903b312c5f5
SHA1ad5b6bc06b492991a72cfcc29f5e5df949290936
SHA2567caf97c77afe7169c9b8c6c93226afdc18e4b3fabeb66683d422694cedff0942
SHA51207600bb8256b7de3d7c08b2ead2f167ac9ecb5fa52c06eb6eeb4e8f8e391170b4e7a9f25743c2f380f6978b89c1087003f481babdcc5cada55512bee4a43cc02
-
Filesize
5KB
MD576479364533a4968425a3ec1887d4455
SHA1daa0774220e83cc261e0ad259e606c94222398df
SHA256c9388dc3528ebd5aa9cc62971cb9f39c4f23c2bdb7e545196e2dc513191e120b
SHA512223487bedf0f4c8e799b29d81a5428c8c9298af8d4476eeb7a3a3259ae15a22cb918f07815fe38ba3422580e5406c1e2b2d4abac180693a76d8a362558771e07
-
Filesize
6KB
MD5794ceb1f6e2b8c5274b0f849869c1f66
SHA1068d9a93d4e3f849c5f55fb19991b52aef62d3ef
SHA256b8b752e52f8b001b11a35d965f0a4a037265353834940d2346755d9027e320e3
SHA5121b79d8d87b4fa951d0aa3cce37723e897df91b36cba56fc1125ada0f02649ca4632bcf21d5a802038cd30e919d4ab890e52ce2ccb6be389cf91fa72e74b770db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dd8d1a301e31319c1e99406432ce860d
SHA120819d98ec0795d0c3f3e51c70bde5dfc9e023a1
SHA256aeab69746808554c87006f100fc655f067f04a7f7e5789045a8606ee14227431
SHA512d08903783a4a283237e677222ab7340c99f25a2ac59271cbffcd6aaa8de263c8de3b64b0e201132490cbe15e095e08087583840d65e0d230610348b07e6d25ad