Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6b8b1b5cd58bcd8c0e7416b227bcb264.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6b8b1b5cd58bcd8c0e7416b227bcb264.html
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6b8b1b5cd58bcd8c0e7416b227bcb264.html
-
Size
42KB
-
MD5
6b8b1b5cd58bcd8c0e7416b227bcb264
-
SHA1
9805f793c6acde6556228c7912de88e3e663149c
-
SHA256
83195eed611f4f51fa6141510ffff634cca1bc0567d7f29f9003e3a28a2f22c0
-
SHA512
4d99689f39e28315fd226e2901b2da9471b5e6134252af924292bce8976bf5c72103ad802f507aee59212e35df44fd21874e2608674de33f84271f6db48dcd8d
-
SSDEEP
768:0iFGOyy8F48HRkktutbk+1tuDrEQSX33pgE1em/KGQ5e7exeaeCeLeZenegeXexq:DIOy7F48HRkHC+IAQQgEb/ZR609VqMeT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 2084 msedge.exe 2084 msedge.exe 5176 msedge.exe 5176 msedge.exe 5176 msedge.exe 5176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3360 2084 msedge.exe 86 PID 2084 wrote to memory of 3360 2084 msedge.exe 86 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1736 2084 msedge.exe 87 PID 2084 wrote to memory of 1832 2084 msedge.exe 88 PID 2084 wrote to memory of 1832 2084 msedge.exe 88 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89 PID 2084 wrote to memory of 4800 2084 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b8b1b5cd58bcd8c0e7416b227bcb264.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb460946f8,0x7ffb46094708,0x7ffb460947182⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3708 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4384257196494394359,16909391682732577499,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5400 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD574734686fc159491d0748451eb6b6dfd
SHA162c33328f3fd0725f90bca252a30eae6bdf2eabc
SHA2565bc51999e459b931ddd5600381fe5859def4b473f324e184efbe63f9ef30a60d
SHA51265b9da609e57f13847ab628e9da03a9abdc8b142e01b32c82131b153200a47aacae1a15fde5e54c1d6e91b8deb4c1dc1c8ce68a46b21cda5cd6dfafe59390f54
-
Filesize
4KB
MD5f1e145c089fbb7a5ee0af28fe5a3d447
SHA1d95be08c54c407ad8e226d4be166d6fc8c54fd8a
SHA2561355ad01fa877e2ae159fb178e8453675be03f76f4ee96a883e030b0d56371bf
SHA512bfdb82229e8d5ff155d083361f867c8f5ee6b4ee35d569038c353441463fb525ec1ba660fbd2b32e2df0c979701c43194314f394b070d36958a35e288a4902cb
-
Filesize
7KB
MD5c40e197af9e6c1c870cc1d5b369c68e3
SHA1423e0f18ff01c5c74e194c5fccc0fd83c7968f9c
SHA256d2cf29ceb345a2d690ba4c79daf820654785c26b13125e7592e80204145e3794
SHA5123a33bca765f1e2f1ecca285f0252cda32920099db1c928b530a56e1f95ebee0cda0103121af99afdbac9e0b020c04ff5ba8e738691b7d21bddf7abfc9a03d83e
-
Filesize
6KB
MD513830b68b8ebf88c17c6703770b3517c
SHA1da88a0dcf4fd3f7934e7a8c81713af63dc59f870
SHA2567e25d32ae95ee83ef7febed7444ae9a979c7aacd4c1211e30b31d756345fb5f0
SHA512fd9b2ab4b53f432cf02eda103913168a438deef5eedc7d84c43c9191b5f974a48cafe7006ed58cce00df995abd06dc10649ea09ab4c4002ca959699f9fa0e719
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD530a28b07c3ff289d4e8afb4ab9d94b7d
SHA1695b4f6e36a7e82ba7278e05038ee491171b5e40
SHA2569b4cb8fb0a49edfad0e5af2ead8160d0e71f1c697553f60fb44c31498870086b
SHA5129037951194b96b4b793b2350e02c5cb5229056a1f3e70e35a04b37ef51fd7a6e6e788df03fccbb15bf7482dda92cb342cd21f1946bebb88aad3a1535e3aeea33
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58364d.TMP
Filesize48B
MD54ec10aec0857bc8833903bddf45ac7c3
SHA118fb1df0bec102c9b2726e2deda8af49870d1709
SHA25653a76fd708b481e6de0f4117077baf625a5ffa2e5234ae85fc16e8ae6a00af04
SHA5122e3de14104bfb7da697a280dcd8e05da42dbbc17b14e127d9a8eefd96aa43a040b98f43cdc81ccdbbebeb116713c27f2553a1a6ad77c5a44817bb9f628c0538d
-
Filesize
10KB
MD5a4dd4990e09065415bdf775d3e1b4a66
SHA174664e6f1e7bc3af1b41d587c14aa991f1f76934
SHA25668aafbbe1c91c8190bc810273c57877c2b752cb3ee0983de79be33db3ba603ed
SHA51238f8229852662a46911b3e72a18f5606f2f2b0952241efc8d09dfe280d048fe16576f0894122a6211cb36668acf4baa287d4d235eb90a71dc7b263795d9175d8