Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2025, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ab455bbd9b620d5d1ce67f9cf4196e05.html
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_ab455bbd9b620d5d1ce67f9cf4196e05.html
-
Size
28KB
-
MD5
ab455bbd9b620d5d1ce67f9cf4196e05
-
SHA1
70ead0d338bd74b16ff9101697159842085ec2df
-
SHA256
4ecbdfd148e1537307756d17a2e637ede41028646d9ce98c65579730fb817b7e
-
SHA512
899f5f3c9863884c7f0d8dcbb391190df21d54d25f369854fc3e530e3913c66b4563e831a94143b82f1046c444c9799a00273f6bad81ee08efa6e035384dc693
-
SSDEEP
768:PtZRsV2+63kPENbuJZYDN4n+Gy1JlwswWuR:1ZRsV2+63k8FuJyN4nB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 396 msedge.exe 396 msedge.exe 2400 identity_helper.exe 2400 identity_helper.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 2140 396 msedge.exe 83 PID 396 wrote to memory of 2140 396 msedge.exe 83 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 3976 396 msedge.exe 84 PID 396 wrote to memory of 1716 396 msedge.exe 85 PID 396 wrote to memory of 1716 396 msedge.exe 85 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86 PID 396 wrote to memory of 5092 396 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ab455bbd9b620d5d1ce67f9cf4196e05.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec77846f8,0x7ffec7784708,0x7ffec77847182⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10357367126467290495,3121177081496204124,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
875B
MD5c9a7ecf48165b64d0e80916ca78da64f
SHA11d7b7499549ad10a76af299d2d02f47631c116c4
SHA256161bdb282aed95d27bb4a362034e0d830b9a8e290fcd3d8911e9e0560738ab0d
SHA512462cea8889afbc1c802ac162809d7e1c3a7aaf5054530d5c37bd08f7ddb598e464b6b6f0a224cf6b19144afec5915e51d9b8efdb68db09f5ebab46644eda0406
-
Filesize
581B
MD589bf675112e3f685d529710358ad5345
SHA1f830c3d5243c347f5454799232f270066154ef63
SHA2565db7b78dcf93a90067a0fa49e54b3f8b096bcc29aaa27520c8efb824a4f6077e
SHA5125dd91ca509da33001fc31d3023a222279338c477b3facc771eddb9e9dfdb8275df32b17fb3f07f401ccd9e11c093ebb4959afc93bf807fac4db8b61b19cfe506
-
Filesize
5KB
MD5826ad5dcf62b45c372f970ddca041fb4
SHA1f69d7e8ade655aea80f6ae92599cabe2dc614cf6
SHA25614cc245ed1dd99e6abc743000ebde065cfbe68a51044d7bcf416c8493e28c8b0
SHA5129ab508a15910b5a8e859938a6b09eced6f681888fe11b75aff2aefe9076bcfe0ffeebcbfc65983178a74c0521b746a10b110822fe57113d5b1eccf643e809fdf
-
Filesize
6KB
MD50f92928c17302004a68635ea98da21c7
SHA11eee08bac07cd360cc6df09298a0277cfdbc5c8d
SHA256dfef814cfed9ceac3bd8df981a416b21c0d7969cca1229eaf12f74b93335666c
SHA512b7047c2f60fadf995c75d6b50ee33de8cee23b39a7079c365032585c78fba2725ee0498222be227fdbbc95779e2496500d8435fc3a904579ccd8dd7ea07ff0d4
-
Filesize
6KB
MD56ecf14e8c11e0553063914a9985db602
SHA1446edf38a4eea52bd71a894a0894e0af9bf4621e
SHA2560ce1837e7607c2ffce5a796190f007b090f67605be692c82ab6e90d642eded69
SHA51279a3c78c0f26e3f5aeefa444d5dc9e6bc7393461944b2a7d434c63292015f509434b50298cf9f88f8a0ffd3c219168f6e9bff861e85c0870a31d535a05743042
-
Filesize
201B
MD56fba6bf42adc765ba7d45e689159e722
SHA15611ed5889a3906162536d145f4273e961d8c768
SHA256e86562c45cb8a71de5141c7529cece874c6cae7854ea6abf8c9bd7634f062000
SHA512ad756a00ec1284d2a8414c092943b657eb562fc11cd0d4e444126201f9da9ab5fbc0f0e288b0d5c196928c0267ce8e5841760f7df47641cc112447393c999f3c
-
Filesize
203B
MD5dbcbc58112ebb12303f199fa5c990ef7
SHA1eebeb2fccfe3e369ea3bce14350a462585396f1b
SHA25682d079896315cad56aa887e724528b4ed8386845a4f30f2c01a603da1d70c9e9
SHA5123102a0178a826315cfc6bdde222ac8376636bf673f8dd5cb3d42fc3b8ffbc6f960070776497a1996d5a71d8644b5dbf547a5aeee85bdd0b96d0011013a6fe4eb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD51ef43550f3ba4fa18051684488c44e59
SHA14518026e289ca24e3daa00eb5803fef1c6b325d1
SHA2569031d3d5045c97afb54d96e9bf58f7c94b4de06b3d54ec5ab43cbf102b88ddb8
SHA512b72a80d8b67ca449acd8312e30e756d3179aa0f4195b2532a00f3a339f3df6b4eb5ef9aeed0a83e14f4c638406dda064f532acbdc18c802400891d91ad1c33c1