Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
0deefe10a8e46637530933d785ddd297_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0deefe10a8e46637530933d785ddd297_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0deefe10a8e46637530933d785ddd297_JaffaCakes118.html
-
Size
15KB
-
MD5
0deefe10a8e46637530933d785ddd297
-
SHA1
174c042758d9950f2e692d7b3b148556ac7705f6
-
SHA256
dbb92df20fffc9e8c017bf458edbfe368415c73faf607030b2a6fc070b68c972
-
SHA512
a26ec626a57e4a3b7309ef5ac65c6c6b25e578f43d4cd0abcbd83a00efa96ed9e5fe00314be2522e9615b8a45b33c8eb01c9d808ed7c46481a763d26ac2a66d3
-
SSDEEP
192:JOZ21QHiuwdBXS6OvnY+irVFcSYd/O4VgjSrll8kpk15Wfc62xQ8JieM+xR0B3Xr:1QHiuwdBXS6OPTtXkk8VxRbk4Mdk1s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 3796 msedge.exe 3796 msedge.exe 372 identity_helper.exe 372 identity_helper.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe 3796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3796 wrote to memory of 1008 3796 msedge.exe 82 PID 3796 wrote to memory of 1008 3796 msedge.exe 82 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 988 3796 msedge.exe 83 PID 3796 wrote to memory of 3544 3796 msedge.exe 84 PID 3796 wrote to memory of 3544 3796 msedge.exe 84 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85 PID 3796 wrote to memory of 5024 3796 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0deefe10a8e46637530933d785ddd297_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c0a46f8,0x7ffd9c0a4708,0x7ffd9c0a47182⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14755070689501090210,15934907575481416919,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
6KB
MD5b654a62dd1bc8083f1c66b3791418967
SHA1417a3280d4fb8bfaf7a8118a2382d0d04eb8abed
SHA256efdc2b685ff4e60e0f91a263390bae18bb96aead7462862bda2021f4fb40fdb1
SHA512734a166a47540545a7280bfed82af2866db60051889f8593068543e83abe03796fa23b4403850fe646ee2fe816dfcd190855fdbbeae98611013caf6bbcba6c45
-
Filesize
5KB
MD57cb4c65ef0080e450e52edf43555c2d3
SHA1bfeecc8825ade1b42b937d9cc7fad26611a5b611
SHA25613927c5e847f5269e2d65672758206b7edbb723dd87c37dad37222def41b35c0
SHA5121f835b0898536196f7a25d840421b5bc5b701121158ee199f83f5b4ff81e286f0f82110983dd5d674430497a17eea6482d923e457619bfff88aa3a3e11395c4d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52e28f4e89a9c866f8cb9eef4dcdb6ca5
SHA10a2e89693bfa11abe0d2d0e990f7c0cf43d35fde
SHA256106344793062b43835b13eb28dc8cb74a07d77da49ed2d5ef44b6f23c0a8c933
SHA51204e80141b8fabf9bc64bc2421e41c8883f2c3cd083a03ba3d62c50277957118c23b915eebc58909f93feee21da54d588290a8ddec6dd6ab73b4a8cd1f5b5847a