Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/01/2025, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2cf40767866a6cba842bcf2a7a3ac6b.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2cf40767866a6cba842bcf2a7a3ac6b.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2cf40767866a6cba842bcf2a7a3ac6b.html
-
Size
29KB
-
MD5
e2cf40767866a6cba842bcf2a7a3ac6b
-
SHA1
01ac2d472bb8faa81c07aca79445561308cc272a
-
SHA256
4c4637b7f46e07e404c3d701e9c740365a8b88fd51be35e5518a33c703b840c3
-
SHA512
4d843faf1fdee61a409130a29a7d62866572a9fa873f10385d646a4a9e2e7b19fdccb56b321548984e356f900d8272e2aa644bf284d40b2fd14d5a9587ba35e5
-
SSDEEP
384:SIxOJmLnrvr+fZUZz3qX38FPMNkV1XPWMTgnEZ:S8OJOnbrwU13qXMFftWM88
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 1612 msedge.exe 1612 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 1372 identity_helper.exe 1372 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe 1612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4596 1612 msedge.exe 82 PID 1612 wrote to memory of 4596 1612 msedge.exe 82 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 3132 1612 msedge.exe 83 PID 1612 wrote to memory of 5032 1612 msedge.exe 84 PID 1612 wrote to memory of 5032 1612 msedge.exe 84 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85 PID 1612 wrote to memory of 3980 1612 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2cf40767866a6cba842bcf2a7a3ac6b.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8ec646f8,0x7ffd8ec64708,0x7ffd8ec647182⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17213742012555581275,7330867607310694836,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:3292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
538B
MD5052270a86dc2b3e0e1ed3312e7fa3369
SHA1c009574798f15e8f00651fa354d74a0179c413a1
SHA25699758510f86d06d457b794938323df26046131494ceb353f63b4fec71b17da5c
SHA512e1d2947264825e705eed6c4394d34afa0a119676476a68232608088adf920df2702269d749f903a18a07c4e0d50751752350ecf2bc98f7e3865d3c0b868c5a4d
-
Filesize
6KB
MD5d59416ef841644629c4c9e24b428df17
SHA12cbaf46ed88efee00a91c2676f9a8520ae201046
SHA25666db09fe6387cb5c3896965904a8809ec30b6e281cf6ea898516acbc10fa0c10
SHA5128a8f036e2029579ae18380bd60eb60064feac6c518663f7e8aa8dc85f42bde9321b74b77f0a1853623271aa475f6531e3d9185dbb6417389208faf64803bff48
-
Filesize
6KB
MD5478a0f68661428a096201c1dba0fc829
SHA10a5ae1f3940f1a5fe2238a5480b4552c528dad6d
SHA25668cb1abf8e03b727bf2995a2ce43906893af017a758b13454ca57bad223e2214
SHA51254a61975f234f93335c68e293b09e3e2fbfb27bc4c1037a39689470e53aa11fff9597e258bb5bee093822e3bf7f4d904a0f8c2e278c793c05898d9cef65e16fc
-
Filesize
5KB
MD5f7f3f84a410ff68644876155211932ac
SHA17bd8aae1417421125e70adaf97ad9b0ab60f9f5d
SHA256fd9fd57599c79ee585c85bf65f39774de134709cd43eb25382b2762896595610
SHA51209e8686554efe4a78fac53f45f0544ade69f852545fc8aab607148df0ca8c525bc342bfabf28e022ed56dedb84c84413697b07cc742fad8fa8f9a921d40fba6e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53930e58e409824099f204274f47bab65
SHA18fead25a8c7b4568e66b3090ee9d11f908020696
SHA25662e92d74d86dd7d8f69788f205c9b47572f7ae4d47f0f541f23ced1f4e7b8e7a
SHA51238375332833032abe49f0a64abcb0b77dfdac7d22cf9b35f9be2f43fb7b97c67d202958562c95efeec55406824d134abf9f1fe8f91897a38196a2e767bb0716c