Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
78c1e0a83c4d1a191bb7e67b944cd4c5_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
78c1e0a83c4d1a191bb7e67b944cd4c5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
78c1e0a83c4d1a191bb7e67b944cd4c5_JaffaCakes118.html
-
Size
23KB
-
MD5
78c1e0a83c4d1a191bb7e67b944cd4c5
-
SHA1
bb211cbe42584b398de717860ca410b3d8c77303
-
SHA256
bb4892da5ea2337d5e17883fcab19ed3e845a8f70c68209085c4e169c782eed4
-
SHA512
c42e02d8aab0be9e8040e003bfde0f23a932761ff88fff9214a71492b96ad172080fa0b313671ca557f1e6746410e49f8a0984ea95178ca7cd97e14d5a9d1a8c
-
SSDEEP
192:uWrwb5n+unQjxn5Q/5nQieENngnQOkEntTHnQTbnBnQCCnQtWwMBkqnYnQ7tnuYT:LQ/SuW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 2140 msedge.exe 2140 msedge.exe 3268 identity_helper.exe 3268 identity_helper.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 4928 2140 msedge.exe 82 PID 2140 wrote to memory of 4928 2140 msedge.exe 82 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 1220 2140 msedge.exe 83 PID 2140 wrote to memory of 3724 2140 msedge.exe 84 PID 2140 wrote to memory of 3724 2140 msedge.exe 84 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85 PID 2140 wrote to memory of 3244 2140 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78c1e0a83c4d1a191bb7e67b944cd4c5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8a7946f8,0x7ffd8a794708,0x7ffd8a7947182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4144 /prefetch:82⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,942165129116452349,10592392548097484161,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD58cf01b4fa05c04a21152226c19b46ab7
SHA1fe3765cc7b8f9697ff619ee520c62342089aaaa8
SHA25666f1d8b0e336d901edcc14a8cf84c2aa9e0903de0e42b049c57992bb9b4538df
SHA512db67f2ed997392d4376eedd72bfdcd74f368bb49e895b627188439bcfb74de800333ba64a6456e7f4fc8110f502dbb67ddc7587b54e8c06c4ae9f64dde2f4779
-
Filesize
6KB
MD584257760b71de9bbd5cdf4d12c62ba32
SHA132481dc7f4eee4630bca3accda9c6035e252067d
SHA2569299700ff5e36372741406b13078f80ead4599c507d96ee2a9af326715d7e6dd
SHA512c32a28ef3db0dac58680782cc894c3186dd11febcf4873d9a553cb09c840d3f17c3008aa01fad9632f6256314fb95b35b0b9f07b265b74d6157740a6df08220e
-
Filesize
6KB
MD5fe2e4fe9124027f6e5d9678b9394faa9
SHA12b8de3c2c96bd2bcece3b22df6365923a65f63d9
SHA2563c032c8d7aa5e788354eb225c64addf65b754f0e5af036fbdef538c637914453
SHA51200e14df92dd06588415d885035f71a1d541da01f72095721784098e16aeb385db65f141cb30a4b58b066982b05cc5980f306deb126eda225cbc229549403cc2b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD533b39da53e0178e22042f7c2e84473ca
SHA10e1e64796e640fd10303800289ef3f7f3333c247
SHA25635bee1ec759ecd19b64f5fb462e927dfa868a036fd685e1660d482389a7079ff
SHA5125825721fa1d559007a1babaf4bd618f6c499bda915af03eb493cb563c2368d93929592aeeb9183d2a68380571c4c78dee8ba8c3079f76322c2c65ee7d86bb1fc