Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 17:48
Behavioral task
behavioral1
Sample
JaffaCakes118_6c69f868f0acddf0ee943eec9ff5b026.html
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6c69f868f0acddf0ee943eec9ff5b026.html
-
Size
199KB
-
MD5
6c69f868f0acddf0ee943eec9ff5b026
-
SHA1
3b82714be4ff284ffadccc3cc31809000559871e
-
SHA256
f7cebf3990d8dc75cf064a08b7c6af841ae2191bde137edba02154faf492fd72
-
SHA512
014b9f5173a4c43ad8d1e093d821aded859529ba7fd6608dc9805423721386b6b74eb95ea325d971ff9c03d95a3c03cca1f15224b667fc28973ced05c981d202
-
SSDEEP
3072:ZSnpywl9Nv3c49nSMhMwM00usnxWbVRCWJdsn4Mt9eaG:Zoywl9Nor0OuX
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 35 sites.google.com 41 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 5020 msedge.exe 5020 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 212 5020 msedge.exe 87 PID 5020 wrote to memory of 212 5020 msedge.exe 87 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 4860 5020 msedge.exe 88 PID 5020 wrote to memory of 3456 5020 msedge.exe 89 PID 5020 wrote to memory of 3456 5020 msedge.exe 89 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90 PID 5020 wrote to memory of 1696 5020 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c69f868f0acddf0ee943eec9ff5b026.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff251646f8,0x7fff25164708,0x7fff251647182⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1844 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1728 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3796 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,10718401371697713876,6381906275869974264,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x1501⤵PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD576105b4c05e566b8cb94e0ad26a3c8a1
SHA1fe793979126a56a001a276340afa58c4279d7d9d
SHA256d0aa91ba3d4443cfc4a682a03475d000b0394fe7a1a2c78db189736820bbd631
SHA5120cf3a5417025bd616aa0a885a6e9086f7f9f7210576304e017774bdc1a38329dda4e8f536d81146f4e020e43a5d7027646a0412a65fa77c158cab1365088917d
-
Filesize
4KB
MD50850e081736e504463143ba5d241958f
SHA1467f84486e7fb64c37fda0f8e6793a0052a80c66
SHA2563bc0a86a68e68b37b24afe9d64d5ec3829746b0845ff62dd74ad95c308c31e37
SHA512824fac99ff20e99c5ddd4c4a0c9c1d6d199c608fffda2d6c069ce455126a1fff9ce97d748df005a662d96720e720060434608c7a36cb599a2accf74e76af85a8
-
Filesize
4KB
MD53544a8ce86fe585953e058ac821c77db
SHA120491424244143126a23f6a61dc8014a2c586e8e
SHA2567cdefd13ec5091b714abbac96e8df69b102f42b8a773adbb0e5b175e41792290
SHA512059b281c1530c9c212076c737dc0e782ffc794abf4b85c7c8b92f5ab458f2355f86930482419dd2a11c37ece33447b8c2d08ce0d9bd87ce339ad1e392e920c95
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
9KB
MD55234e172c72c0d6c32ccc7c5a2824971
SHA12fb2344913c53a60120fec4ed37251d0bc9f5f5b
SHA256c56444827efa89a391b156b844868c029f98fd2bd3f103b447e6ef624e76dcf8
SHA512095472eb752c9f2c6af734f8829d59dd9c958eb339e97c79b6e542e265a92aaa838a1fe0d639e5a7e2200fc0d29e1ed2af99825865b61ae5050aa80f6893ab51
-
Filesize
5KB
MD56cbf33944fec4ab596409adf89f2ab83
SHA16b863068b7cbbda12462d6de6e32e9937328c63a
SHA2564e118fe96e27473284b36801ecbb183496b706be631f1a044deb2582316fa74d
SHA5121070a1a3f311beb4a2f509944dab28484eace3f3cf1f6104d8fafbac944dc1dbf3b1d045c803a1052660836ded63508db2b4fe2bc04d53548dda69efdbb707df
-
Filesize
7KB
MD5d373d455c8fbf98b20e9e2124eb27610
SHA1ed1584e59cda8bbf72d93dbc441e11ce78acbd2f
SHA2561464a3f331f70cf8061f3dd109a84368e801d01bb85ea6f0d53c4d35e6b9e4f3
SHA5124f708161cd4cfc285fb7bc17998154a96f430a2fc58de3019e9a674254506185ef7db08aa29ea609cc1fe877af83950fb35712699839ea036fa00625c23e4ddb
-
Filesize
1KB
MD5ed2fbff8f92a6e361603c453d021a16f
SHA1ee763ed7d15174c5ff2d1de8a13fe371ed72f93d
SHA256917a5b460570cc147693adb04c4b0c12001312020361b63b70014f7e32d565c5
SHA51242e170fc09238de5cdf24657684079e36e4088b7e96feff4b12028933cf55dab1474e1ff75009dd88b8ef1bcbabf2c9f80c08ffee00dbc5bfc814abbd3714d7d
-
Filesize
203B
MD5f7c3b5b7888a653f30f7ea194138021a
SHA14afc140c9c8104a0c70a608dff10a24514fbbd9c
SHA256467c27cbd334aa57fb381d3e34d2aff9f698d356fec79cd5c3591d0689958cf4
SHA512babd5523023d2aca4a4e94786c59965c899b2c0642473d17f32fd542ab3bdb32324ee532fc1228c7dbb7dd3781d6df2c14c16b036e48ba53b4246a1b55e71807
-
Filesize
8KB
MD5a48b43f09664df3b97a76c9f03e097f2
SHA133ca55984daa7fbd78f5360f9d214eeffe36359a
SHA25655b249776d7039661a2abc2b1da7152d78c8e9bce569d107913a8eee61f9f34b
SHA51215415746d1fb2c2cacb9e09db75c8771dffc5ab27397cfb4ee1cc2f5abadbfe1ba0a9d53495a75d03d5439abe6fc90d484fdb51ca427f0aa323a18a0544576cd