Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
78d9713139a0a7904d9892eb2f860648_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
78d9713139a0a7904d9892eb2f860648_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
78d9713139a0a7904d9892eb2f860648_JaffaCakes118.html
-
Size
21KB
-
MD5
78d9713139a0a7904d9892eb2f860648
-
SHA1
df399205d1ed9aae281c1ac26e6eb0d298413a5c
-
SHA256
1fb1b6707d081f281d038b551c6effedb6a5dc52a78326ee9fa0b620dc20d0b7
-
SHA512
21ae54875b72deb9127a3f319ca30866fac0e62d9148eff2b1c094b33438afe5e770bc696ddb6429f913476bc1eb4b0fd7f5c9e86f0a09b373a28478a737e813
-
SSDEEP
384:D+sMNKQqXqTFsZk30C7cdkudm4VR7R7R7vqWB2XcH1VGWbf0VJBq0/ezi1UEMosj:DxMQhXqTFsZk30CgdkImiRllTqq2sH1D
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1572 msedge.exe 1572 msedge.exe 3244 msedge.exe 3244 msedge.exe 4312 identity_helper.exe 4312 identity_helper.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 1332 3244 msedge.exe 82 PID 3244 wrote to memory of 1332 3244 msedge.exe 82 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 3032 3244 msedge.exe 83 PID 3244 wrote to memory of 1572 3244 msedge.exe 84 PID 3244 wrote to memory of 1572 3244 msedge.exe 84 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85 PID 3244 wrote to memory of 4884 3244 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\78d9713139a0a7904d9892eb2f860648_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0aba46f8,0x7fff0aba4708,0x7fff0aba47182⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8633108181606588761,1907453687983150030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
592B
MD54d656b78a162b16b0148bb3f70356929
SHA15939a2422e520a0728c38d7c1d110aa477a25628
SHA2568e3c5e89fb5035eeb616039534d03bde177b02f3c5a40e81bd27f431890eec36
SHA512d86a7c02c94110d620ca95cf7cd8af5a9653f8f394e5f05445053abb317711ad048f9b617f0dafd2e292c2110b19edffe1394c076a2189c3f55fa9725a91a21d
-
Filesize
5KB
MD5c8e4a91e8adea6add80e281cb38a06fe
SHA1216000b7b1bc7c92ce67731cfb7a9e1c41cfd15f
SHA256c1bc7d863547c253d938ad59e49f46075b591689bc9f58676171b1a870d8e284
SHA512b5e76f9949dad9accc4d5264f0f066b08ace71901d2c01bff5290b8d6f893244b94a28a842bb33d6af075e197ddfce6b6488d32690f448cabeee2410a73e1c92
-
Filesize
6KB
MD510f928ec9c8128ddee1ece0801940d62
SHA111f3dee11af374d9c9168af17391a4fe9781ad24
SHA256614d9f0d609754d7ed4f754f51ea67fe8d89724ffc8c1e4549a5a1de69cdbd9f
SHA51281e2ac3429fcf9b2ad10fe7ea85899801ed4e1233cae71471f63604b3ebbf2b9ac4919c5c0470228e2e39dd6622e6a315e82368bd609b97c482d8228be58c47f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD590b9c92dac7724ad2d330387718a804e
SHA1294d9056fed080fd658826969fb0b2e32bef0c2a
SHA256a00de9a9078d118c54028fc3f16f097c97286416088da283ed659a52a62f76f2
SHA5123cab1d7e5dbfd8b1a4fd9b5e4d9e20ada2a9b13c004d04417f2d4004d2b6eca95ef8b90788bc3020d8bf2e5742732efcfffea3b9bd39f362edcdd70f768e091a