Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4b0c375be62d4f9d3ecf8f8a80193990.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4b0c375be62d4f9d3ecf8f8a80193990.html
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4b0c375be62d4f9d3ecf8f8a80193990.html
-
Size
40KB
-
MD5
4b0c375be62d4f9d3ecf8f8a80193990
-
SHA1
0fe8facf34ec97d5c0963ee566975af4bee5aa60
-
SHA256
b0ddcc0c8e62adbcaf711600513a56d7c6ab9e693c70c2cafc71cee448cdcac0
-
SHA512
ef7ac112e0b805349998fa57d17e09484cf1c4ffab188436d28718f25429f3f230b0ddac6471b93a5f45db1dd7e76dd9c28c6307a0dc464eeaba87d5dd57bdee
-
SSDEEP
768:4jf9T7Al+O5tu/fStu+y32gxJ3/gECNY/qqEQ/PRcU/JD23rZ42:4hT7AlNW/fK42AgET/s0PRcU/JD23rZd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 4464 msedge.exe 4464 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4692 4464 msedge.exe 84 PID 4464 wrote to memory of 4692 4464 msedge.exe 84 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3584 4464 msedge.exe 85 PID 4464 wrote to memory of 3568 4464 msedge.exe 86 PID 4464 wrote to memory of 3568 4464 msedge.exe 86 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87 PID 4464 wrote to memory of 3648 4464 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b0c375be62d4f9d3ecf8f8a80193990.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd08b846f8,0x7ffd08b84708,0x7ffd08b847182⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,10080822594557224887,715064361714222559,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1688 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD525f87986bcd72dd045d9b8618fb48592
SHA1c2d9b4ec955b8840027ff6fd6c1f636578fef7b5
SHA256d8b542281740c12609279f2549f85d3c94e6e49a3a2a4b9698c93cca2dce486c
SHA5120c8a0d1a3b0d4b30773b8519a3d6e63d92973733da818ca9838599a9639e18df18ce31ebf56f46f6bbb7d89d10c726f4d73781e154d115a6068a3be7dd12b314
-
Filesize
152B
MD594bd9c36e88be77b106069e32ac8d934
SHA132bd157b84cde4eaf93360112d707056fc5b0b86
SHA2568f49a43a08e2984636b172a777d5b3880e6e82ad25b427fef3f05b7b4f5c5b27
SHA5127d4933fae6a279cc330fde4ae9425f66478c166684a30cec9c5c3f295289cf83cbdf604b8958f6db64b0a4b1566db102fbcbdcdb6eca008d86d9a9c8b252ff16
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD5365dac1870ecc2ba3069fac806fa91ed
SHA1b592c5daf8adf533fd6f5668cab383231929fbd4
SHA256b824df4e5f2795c3474ba81c7cc86e3de12ca1440bacd534dcbc7446ae55bda7
SHA512cdce63ca05f670d402c4a09fbe656c9a32e605be09d81956bb2b8ca82885c73b1e535a7fb1088fbb0c4c674442499e087160151d900f15dc5150b59041069046
-
Filesize
4KB
MD544942bc19a64c35ea4da00e536efd2f3
SHA1e50d1ecc4ddb16f3107b4b9f82d9ca0fe258cbaf
SHA256321afbb221161c633f5181b82049b6d88f002af7e84b77e7f6ac9dccce9bd1d0
SHA512b4b096be93615ff7edc147d8cddb72a066e310847b6580f906fd66eb45cd6803981b04b0b62e4a1e80b40372232ac60bf74ea924dc95bc820bb7398976967bb9
-
Filesize
5KB
MD5a8033c36d3e3c322d26db29a7539a913
SHA1c982efa2c23391f33c87eddcefb865a253eb2d43
SHA256c37f1e2b18883ae7d26a232049ea03185c86f57a58f757e06f7be988153807c2
SHA51222431a4da0ad78e689805de53bd43bd33f0f44a78f7e8237dfdb2db0a6ab2e6b6cff344ac58c7894a281199422bb2920a9bec17806b32155435ce0db3a8b21d5
-
Filesize
7KB
MD569e3997170d78ec2a029d3c6492ef09e
SHA13cac23b7a0dcdc5bbf5d398eab4553a483d56a1b
SHA256abb8e29c533d27cebc67c4a854957ad9c45f7a506a8c51cf531635c13cc4d8dc
SHA512ba4b7e6892e8a32c9618b125c7e02b854335574e0e2cc8d0dc90b1523a0a525a1c14d85eb6737bdbd78591510db44f4e19ba9df8d16e48a9fa0d85ad7082e6b9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55562bdf9657be5ac14f937a4031cef34
SHA1d3df99edeb8d0ad43f13ae26cb7310b780e9eab4
SHA2560d80aa5f9590bd86466721fd2a901181dfd1b9cdc00269cdc40ce805392e24ce
SHA512fe275110d603c7b21ca1a67c0d1f27412713c1957af6cf54d99bb3928b4165f52e40dd853d787864451a8c8fffb0800a1899bcca7e3e6298fb02436178fc1096
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5810d4.TMP
Filesize48B
MD563e20a0c93c140baed1be4c1bd8e8186
SHA132f6d871cfc751d43110e16cc5531b0a22962c40
SHA256ed05df1f0be76ebb9a1319f7e85aa2b44ca7a3f05791f7bfb47a6da420893eed
SHA512bcf3baa6215e1ba95c873a3965986f2d056e4a3c5a726b060d786d573eab88c7499a4a5318f23acb2cde9e038d3581cc701ba87fda897cdecde5316f61692045
-
Filesize
10KB
MD5f0101e5363b4a43e36f87b9954cc09fc
SHA17515d1310430a7267afafc248517d0588b2a3131
SHA256e65417effad95e68022fb82624e76f315a401129f4421b67cb47d46482cfa3ab
SHA512427e84fa44e384415a8884030980fc42967f7f5f28503bf6b3f780f1c231927dfc10f929a73b8ded11e01e1e509d59536232f962b1d2e21b547741e3d94670ad