Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_690515a526599f6b2f044f7be6b93dbe.html
Resource
win7-20240903-en
Errors
General
-
Target
JaffaCakes118_690515a526599f6b2f044f7be6b93dbe.html
-
Size
64KB
-
MD5
690515a526599f6b2f044f7be6b93dbe
-
SHA1
63b67a4c74cd5159c4c012da59103eabf6373464
-
SHA256
abe5217001205a8da1fa557b87fe7b1e26835da9d81df557f6b6584fa26bbd3a
-
SHA512
ef402c5a6866c4a92718e1fc8f082070d500d960ca6cf090691ed3104fe85b48edd163a49744ecd82498e8c5770dbf372ce932461c456d359935a53c2d589fd3
-
SSDEEP
1536:ZjzGwhEGtlNJQL1s2SwKjcsb4Hsj4sRGQf1detqx6:ZjzGwhEGtlNz2Szjcsb4Hsj4sfdetqx6
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc pid Process 100 https://jira.ops.aol.com/secure/attachment/688199/failwhale.html 1376 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3772 3592 msedge.exe 86 PID 3592 wrote to memory of 3772 3592 msedge.exe 86 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 4988 3592 msedge.exe 87 PID 3592 wrote to memory of 1376 3592 msedge.exe 88 PID 3592 wrote to memory of 1376 3592 msedge.exe 88 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89 PID 3592 wrote to memory of 1384 3592 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_690515a526599f6b2f044f7be6b93dbe.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff962c146f8,0x7ff962c14708,0x7ff962c147182⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,15304254886367020463,6846919681895004676,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,15304254886367020463,6846919681895004676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Mark of the Web detected: This indicates that the page was originally saved or cloned.
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,15304254886367020463,6846919681895004676,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15304254886367020463,6846919681895004676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15304254886367020463,6846919681895004676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2584
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
Filesize
7KB
MD58a6e8484d8ad3bef4fabaa5cc75954e2
SHA13f9752e3e4589c68ec033c12559b82f5af7ce07e
SHA256c6c314a804255ccd0d05b4f2e22b550455343c2f4560ae19b421eb4f319f9833
SHA51291b8dfd8c7625deca4803cea8e9a0924eb22035979267d09e0558c0658313175b82a6d7a7573705e8951c6b07dcbfcdb90bebd4b7c30d098ad42d2f5888f143f
-
Filesize
6KB
MD5d456630a21bfcf34e89386597d1ab757
SHA1b6b7c594be48712625c5a816c81bb86dc2eb4f8e
SHA2562a354b4ff20525d2d4ef1e1f9dfd1d8e5b009a8138b86f4b0fb636a161e2850e
SHA5128642997b135bfcec1652f7ab17657007fd52d338524ffe1ec481a2add634b65ff9746b4ce9d00722d1bb010b3c1189725f0d9cd2110e7074b0aa8e4c909a5a81
-
Filesize
10KB
MD544c268b7fc765752a335a81c3de2aa14
SHA10bc7d4f58d28522a2c4550eb12d8cf93cd91e5eb
SHA25623d44145b52c862513a445fe0b714f3f5e243e6aba9e4e0859b6a4f4c4be683c
SHA512c98fdae84a5272f23c409aa6d7fa19b8db70f28120c0920c233379bbcf78f1c4e3f3a7308bc7c82a35d2fdf9ba5364d0f94c79cea4863c7ee0df4c2dd8f27d32