Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4e182deafbc980b85a1ac93a7fa4a100.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4e182deafbc980b85a1ac93a7fa4a100.html
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4e182deafbc980b85a1ac93a7fa4a100.html
-
Size
63KB
-
MD5
4e182deafbc980b85a1ac93a7fa4a100
-
SHA1
69b85a48a29d36e74d4a4b707d1191a7d9bd4fbe
-
SHA256
f9d4c4ed5a5887e4920a0a5e41a06f5c3480cc33b44c5ce53e0c8671c7369716
-
SHA512
47b576773be0cea04926d8fd7f002fc9ba6ca9e01a4f6556808ce938e8e3928f02ba26e3daf0f6e713e5abcf9ba8ebf0ea53e45c00b59cf2335342c7d12fc6a1
-
SSDEEP
1536:Y5QIOyZF48HRkuyDqcoJLz5LgvhLA20wsJ7naUGOgEk/s0PRcU/JD23rJd:Y5QIOyZTFw87aUGkZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 368 msedge.exe 368 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 368 wrote to memory of 1160 368 msedge.exe 88 PID 368 wrote to memory of 1160 368 msedge.exe 88 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 4144 368 msedge.exe 89 PID 368 wrote to memory of 3240 368 msedge.exe 90 PID 368 wrote to memory of 3240 368 msedge.exe 90 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91 PID 368 wrote to memory of 5084 368 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e182deafbc980b85a1ac93a7fa4a100.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5aa746f8,0x7ffd5aa74708,0x7ffd5aa747182⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14809778349802795754,11839283074183386092,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:64
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54c9b7e612ef21ee665c70534d72524b0
SHA1e76e22880ffa7d643933bf09544ceb23573d5add
SHA256a64366387921aba157bba7472244791d5368aef8ecaf6472b616e1e130d7d05e
SHA512e195e1ce5e7c06d193aa1f924d0079ea72b66eb22c3aea5b6811172251768f649368734e817996d9f0f72ddfd0e2bf2454aaee0bc650eaffd56fa125a334ae88
-
Filesize
152B
MD59f4a0b24e1ad3a25fc9435eb63195e60
SHA1052b5a37605d7e0e27d8b47bf162a000850196cd
SHA2567d70a8fc286520712421636b563e9ee32335bca9a5be764544a084c77ddd5feb
SHA51270897560b30f7885745fede85def923fb9a4f63820e351247d5dcbe81daab9dab49c1db03b29c390f58b3907d5025737a84fff026af2372c3233bc585dcfd284
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD57c3df1096fd7f7cdcbc08917738c30c6
SHA1615b4b2117eb87da751aa3713f1ba5e1c16fb48d
SHA2568359c89ac9c3cd78fb26c5a4939be056f4774ee788578b36c250b04ea781b1f7
SHA512549d4c96a1714f4945c4c0fc231e5ea1528bb355095dd68286bcf02296bcce6a72cfc860c1125622c3ebe189e1ff3be11556b1a0f17492cbb0c6b38f1199e6dd
-
Filesize
4KB
MD5fd0ae37b352982a08c0306ae55a04cb2
SHA1cf544711d68a86cfdc8823effcc5b4f6e78d9bb5
SHA256a54d1f5bd6b113c4a45c614376386f8dc52f57938507884365cfd45e6b4990a8
SHA512913e638512c47af912b799be9475f973becc106f9c11371c2c95f43faa48aa8bb69700d703d441a0702b3f2e7f3e4b4a277f2e52629c43b3c28a34633e60b503
-
Filesize
4KB
MD5d46178ce7208d83bf9ff4c5a60dc3848
SHA1db79fba19733b2f2a6d629f83c37a9fb15a187a6
SHA256accfd7afd157313a7a372af83df6b441440f381373f690bf7cc0f58767b5bbff
SHA512d89a61603510afcd1dc4864d61b289db9760c5f57f67d8e6c298b3804cea5919312a490185587439c6c59aebcc906995371f224221abacfa787fd11d61d9112a
-
Filesize
7KB
MD5d6c276469a36548e6e1788e94be9e5b3
SHA1ac970faa4667184ae82ea7db7f8846d4209035cb
SHA2560add45825faf4d9078b803641833b964e99364edaeef39668cb055ab8617b36e
SHA5123963ccf02d0f01519a5156d4d85165f053ed5b146c8eb7253ec5e3bbbfc2ebd4a91de930edd7af410de7a0c7abec9f573a59ff5acd6411dc9aef6da08a8e0dac
-
Filesize
5KB
MD54e802ed105e19705e4884de2711c8f04
SHA19c5812e2926dc832c673cc59929427aec3c71618
SHA256d64cd637505df7ca40fe0852b98d77e57024e836ea46396850ea529bf1bb1e77
SHA5122474552ce4c341b3c96abf4aefc1af45391e418e2e38290192f6a55af704536ca9d833a326db3857763214a4f94f77e9200e4b5531e2a60515509c3b83846c73
-
Filesize
10KB
MD58cf11b69aea6b4baa2318e6c5e5c2d33
SHA1ff941e3f13a0a2ee18c8d9009dd74eaab9584427
SHA256f22d4908184dcd439c39f1447d9fa28fe0ccc46fb753b3aada80e039eb97c9b2
SHA51264ff6b6e715028494b33e8f9d9af0ec6783b1d26492ed6ea6a8387f000cd9553bf511ba57bc7577ea4237db8b48b831d7a52a2a8315bc7102b599a632af05674