Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 12:20
Behavioral task
behavioral1
Sample
JaffaCakes118_6b00a6f6263ce185a0e05bf7fbaf9249.html
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6b00a6f6263ce185a0e05bf7fbaf9249.html
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6b00a6f6263ce185a0e05bf7fbaf9249.html
-
Size
175KB
-
MD5
6b00a6f6263ce185a0e05bf7fbaf9249
-
SHA1
66f6ca8257a8ae1fb72f84feaf3ec4523a27ddd2
-
SHA256
eeb41708ff770a67617a3962269bb93f03c614147550c89afc54c03c86204452
-
SHA512
eed2ebb6fcdfea29194c0b8e4fd66a1f83bfede1a858878b1833bacb72d7696d822f6566837dc2e10687f4b8c31dd514533c29506f2105f9cc12ca2f397b3579
-
SSDEEP
768:26JO5GSlFKH1l6/EMxH1lMKxH1lMKxH1lMKxH1lMKxH1lMKxH1lMKxH1lMKxH1lh:2p
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 37 sites.google.com 38 sites.google.com 28 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1144 msedge.exe 1144 msedge.exe 1528 msedge.exe 1528 msedge.exe 1452 identity_helper.exe 1452 identity_helper.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe 4384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4400 1528 msedge.exe 85 PID 1528 wrote to memory of 4400 1528 msedge.exe 85 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 4548 1528 msedge.exe 86 PID 1528 wrote to memory of 1144 1528 msedge.exe 87 PID 1528 wrote to memory of 1144 1528 msedge.exe 87 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88 PID 1528 wrote to memory of 1836 1528 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b00a6f6263ce185a0e05bf7fbaf9249.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98b9246f8,0x7ff98b924708,0x7ff98b9247182⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13258033839096346386,6342046059789488582,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fe6fb7ffeb0894d21284b11538e93bb4
SHA180c71bf18f3798129931b1781115bbef677f58f0
SHA256e36c911b7dbea599da8ed437b46e86270ce5e0ac34af28ac343e22ecff991189
SHA5123a8bd7b31352edd02202a7a8225973c10e3d10f924712bb3fffab3d8eea2d3d132f137518b5b5ad7ea1c03af20a7ab3ff96bd99ec460a16839330a5d2797753b
-
Filesize
152B
MD51bed6483de34dd709e03fd3af839a76b
SHA13724a38c9e51fcce7955a59955d16bf68c083b92
SHA25637a42554c291f46995b2487d08d80d94cefe6c7fb3cb4ae9c7c5e515d6b5e596
SHA512264f6687ea8a8726b0000de1511b7b764b3d5a6f64946bb83a58effda42839e593de43865dafeeb89f5b78cc00d16f3979b417357fa2799ca0533bdf72f07fda
-
Filesize
751B
MD5fffae38c84b49ac158312e22d2674c1d
SHA10c67a8f4f7f80ca109864167ddaab7dddae7be5d
SHA256bd2a42e49e2101661923789d7632a34d34dbc628f6062c267eda01c139f9206a
SHA512855b9896bf0043ee099a776d454d5db77374039f7cb9b207017b9e4102ef941ed1fc23d2f5b2740c6772d9be896954abefcf106c0fe0f8eda29c5e6be15a13d8
-
Filesize
6KB
MD5ee9436f2123c76c686966969ca62909c
SHA1e9141c7387222ec75110fd68c6d9f09b72fd7ef8
SHA256dfa27cc0fad48658da53d827935486a1ea76dd2590f697215e4f7e639b6c7001
SHA51241b59ffc2a0b1a67c3844b9e01533ad5e4271690668b4f4a3204edc6e30b4ddf75374b3021f3627009e9ad880b329c7703cd5df85215ef37546dcf332bc1777c
-
Filesize
5KB
MD548f65245e4434810cbd67844470282a1
SHA105a49fd3fb9ad9d6c977ae895d2609e729934c4c
SHA256d2682a0775e1d343edd1110bb3d0a21e7c6f3ca81e7f98a23d56977d5013b6bf
SHA5129a30b0783197533a60a5b592596e5a1ab30d1e535371d1866b1e8ff9df253a56a08cc9bdca37c16c63f7c91123afab644ce8896192b43ea7b30b332571d7161e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD592f1518cbb69b625b92257bfceccb091
SHA12ef8dbdc226eb06701e7ae140c2a46714b72d7b5
SHA256bc923cd2d7d394c0d6a40bd3c0d583a184140dcafe2a0069d8012952159c269a
SHA512ff1a4e6c8924d977c176a218bb625cfb12084f33c203ab2ec667158bb93e0ab39d7c445f71329a34e5e347c65a866b997a886d5a97b05cc5bad471b5529a007d