Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_603ba4c4b5796dfaddbb5c7d71c7d018.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_603ba4c4b5796dfaddbb5c7d71c7d018.html
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_603ba4c4b5796dfaddbb5c7d71c7d018.html
-
Size
227KB
-
MD5
603ba4c4b5796dfaddbb5c7d71c7d018
-
SHA1
2cb71b7c084ecced411bf8011a95f9dd1a7d512c
-
SHA256
c6b4c2bd7da1ad1c239ce93dd601146fe13c49b655580c85185026894a7c302f
-
SHA512
b122ae78e73326dca973969cbb4654a19deff472ddec05b1761019c5385136b8395de46157484b54e474f03e31646ef1b540d76c8b7b1c58f7550be4c652f62b
-
SSDEEP
3072:Vnw5lKseu3SKod8hQnVbmwqARwlq11MOnv8sF6OZ7+3Vy+2ZrNSh/MxY+Kj0Myr3:VnwPKsiS/Vw
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 sites.google.com 28 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 1248 msedge.exe 1248 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe 4124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2148 1248 msedge.exe 90 PID 1248 wrote to memory of 2148 1248 msedge.exe 90 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4756 1248 msedge.exe 91 PID 1248 wrote to memory of 4392 1248 msedge.exe 92 PID 1248 wrote to memory of 4392 1248 msedge.exe 92 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93 PID 1248 wrote to memory of 2284 1248 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_603ba4c4b5796dfaddbb5c7d71c7d018.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb35eb46f8,0x7ffb35eb4708,0x7ffb35eb47182⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8169183098087516448,17614464264545664917,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,8169183098087516448,17614464264545664917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,8169183098087516448,17614464264545664917,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8169183098087516448,17614464264545664917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8169183098087516448,17614464264545664917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8169183098087516448,17614464264545664917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8169183098087516448,17614464264545664917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8169183098087516448,17614464264545664917,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8169183098087516448,17614464264545664917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fe6fb7ffeb0894d21284b11538e93bb4
SHA180c71bf18f3798129931b1781115bbef677f58f0
SHA256e36c911b7dbea599da8ed437b46e86270ce5e0ac34af28ac343e22ecff991189
SHA5123a8bd7b31352edd02202a7a8225973c10e3d10f924712bb3fffab3d8eea2d3d132f137518b5b5ad7ea1c03af20a7ab3ff96bd99ec460a16839330a5d2797753b
-
Filesize
152B
MD51bed6483de34dd709e03fd3af839a76b
SHA13724a38c9e51fcce7955a59955d16bf68c083b92
SHA25637a42554c291f46995b2487d08d80d94cefe6c7fb3cb4ae9c7c5e515d6b5e596
SHA512264f6687ea8a8726b0000de1511b7b764b3d5a6f64946bb83a58effda42839e593de43865dafeeb89f5b78cc00d16f3979b417357fa2799ca0533bdf72f07fda
-
Filesize
1KB
MD5b524630cf0c27089ec5143ec96dc99a7
SHA1de00bb5aac92e7777ebe24ed0e9c229617a2b41d
SHA256280bbc72f2bfcb29e433815c40aa6cfc6c5f2c7406996a21a4812b31ddb451d5
SHA512fafadace646bdd927d42cbe0c1537cbc72d2d1ad3cc41c83401dffb68578b0ba1fdff9669a60377933d48941c7ce62f60a111c26ce868e95df7d7caa6583b4fc
-
Filesize
812B
MD5d3604743440f63d7fb757be7aa61da34
SHA104e8419028f9bc27207c7a24176513687e0ba6df
SHA25661a7efe4be16d13e02aa313e341589eff6c79eeb5101c0d69e61ac3cf59ea6b0
SHA51265f82a21919b88fb76b8c14db785ba883e8f9e01bfd19da6b73b2827a552f70b0fe8fd1e391997ca04df22772e9bf6ec777691aba1cb0f9967b6b73f2ed7a417
-
Filesize
5KB
MD5207a1ed48162b8dec5391f0f7770f6b7
SHA101e35bbf6150eb130d7510d79d06550d0d6ae3da
SHA2567513970c0d8971bb8747b7ee37623c9603b7c28c08210dd51c9b3995e9944f35
SHA512b3b03663e9e9f22efdb4d3b777e7783978ae5f09d683c43e4a88cefa881a85807f13b8cbf1f6b2eefbe50def708d45b8e2a04f36f4bcef6201a569f2934ede90
-
Filesize
6KB
MD5b1d92d1ea567fe323fa1bc5f590ca08c
SHA1de4e4766314ce048768a2f48c02a12d3260b6dda
SHA256ff7c7589287077f197f16a1516241002c38b9efcbc94aa754e4666e768ac481b
SHA512d05f203bbb6b3729b4af34a5e184042fc9f15c5b3ee08a013dad856deca57334785559b23d573ca27ef8d2e7f59e4054e2c7c7bd88abe1a2c8fb5709f9a8647c
-
Filesize
7KB
MD5778fa696a50a70af931516c4737c291f
SHA1dea6d905a36351bc8ba7bdb9f9edda5419306e2c
SHA25658fe4f1dc7a8f2f005d7b5b95105c5d19215f0a317dc53c52cc23e6b9852c9ca
SHA512b41eaf20c231e1247c37599f161466111a15b8145eb310fc808d29144e2311103b2d95e042aad4fa813d47d600a5f51778f78bf18649f1e86acb04e8bc07c3ad
-
Filesize
10KB
MD5237658b5d924df3339215885803fece6
SHA19340b1589fbda5f7987cad29aaedf7417fac1ada
SHA256eb0b40a39f3cc6b195d82773c06e0a66956243e18bd54adf6e05106b92c0bf7e
SHA51225dace04866c63341b52f5d8f30808dc2c2eaa53444976c30f742df1dd69761ac41397c7ac137e0bbcb13d194f93389be351b6016e2e645e258a3eb2446c23f7