Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6cbd4256ba1051b50ef802c873666e3f.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6cbd4256ba1051b50ef802c873666e3f.html
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6cbd4256ba1051b50ef802c873666e3f.html
-
Size
76KB
-
MD5
6cbd4256ba1051b50ef802c873666e3f
-
SHA1
19c6b2e2d2953a587b4a1fd4672dbde9985ad956
-
SHA256
454af8e19b47f6bd7958a412e002c39225f8f93bf5c13b62ad7aaf8f59659846
-
SHA512
49f29b07760fec3b5fde5bada90c2e757d285d023529cd686730bbe48d0a78fcdf8fcedc8422314b73c196b9f5174532cab0acd71660e84c083ed0ab4da3fab8
-
SSDEEP
1536:Np5pBowzHFkZvNu1z1seeeebBHI/9snth/:Np5pBoelYBu9snth/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1588 msedge.exe 1588 msedge.exe 2892 msedge.exe 2892 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe 2892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 3436 2892 msedge.exe 85 PID 2892 wrote to memory of 3436 2892 msedge.exe 85 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 2480 2892 msedge.exe 86 PID 2892 wrote to memory of 1588 2892 msedge.exe 87 PID 2892 wrote to memory of 1588 2892 msedge.exe 87 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88 PID 2892 wrote to memory of 3064 2892 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6cbd4256ba1051b50ef802c873666e3f.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed61246f8,0x7ffed6124708,0x7ffed61247182⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11782646563629745305,10811130489455995423,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11782646563629745305,10811130489455995423,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11782646563629745305,10811130489455995423,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11782646563629745305,10811130489455995423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11782646563629745305,10811130489455995423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11782646563629745305,10811130489455995423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11782646563629745305,10811130489455995423,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11782646563629745305,10811130489455995423,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5668 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5c4af0dcf1e87984c3676c8785fd1ce84
SHA171f09d52ea45d8ff1cf64515206ddac8fe7c3774
SHA2569e98c4ea3828acedf3b1901b6101849f738f613d187b56785ebb7419afc93c7a
SHA51229a14a27edd4c736cdb5993c83ed2b4941b47fcb05aa05aa737d31e852f18934bad998e66ba4b7e65701165bbd511e1695d6d2c4a4815fbfe179f464e51c045e
-
Filesize
152B
MD5f5da507c2059b715761792e7106405f0
SHA1a277fd608467c5a666cf4a4a3e16823b93c6777f
SHA2568c1d99de087ac5f2e7b2afce66eff36a646bef46800c0c1d7737d6f0df74b7e8
SHA51201c92729dd8061aa122b116a674c73bb78016f66d2cb8f7fb64907352758a825e87a1e345334386440699d2a6d1e17baccb400c5aee151eb64e64019cbebb870
-
Filesize
152B
MD53c6e13dc1762aa873320bed152204f3c
SHA138df427d38ca5ce6ce203490a9fb8461c7444e12
SHA2565c441148843b7c8dbff4c4a72962a532aaf0bdd484d07a03dd9a32fd461b1371
SHA512133054cb042e11013bfdad1bd11e3407d08cf26a66d0743bea9708d261aa904a1047bb0097b187ecf8436cb6cff3bec28c89e435862cad0e0fa264799556b70c
-
Filesize
1KB
MD56f1bf12ccfe1cd85a4dfa0b15befdfa8
SHA1ba9e5f5af992499a0dc15e78d6487f2e1668a9bc
SHA2560ed77535d11dcc4edfbbb9f1ff884ffb5761d547f8e7270556cca44c7b39eba2
SHA5123534de6d5f8bffb67a42ef94ca47fed23ffcf63fd9f2eb38520fb072f43b93fa24cb84044012257121914a216404ceb98d20f715bdb4c154b6ef99894c313328
-
Filesize
6KB
MD56f5150ec05ed86e060ee4f499bae87a3
SHA1646ba26cb2be6ba930af3b7730e7792c08564543
SHA2560e6f7ab3f484a66102b52e6fb38679ff679f031bf2e69d876f8e812684effb8e
SHA51231c538c8f31c92688487564b9dc0653951b4019358b2d77ce4bc5820251df1169e5bed548240fa3446113211dd980b89ecc7e8f4575e52798634f22e7e7357bf
-
Filesize
5KB
MD5e4220b603e9933ada7476a369cc9efdf
SHA1d251ad1e33526c5a88f29d194e4c389582e21d62
SHA2563116646efd00640ddd50dc7ed2a2bd2b5305796f84374f44fb8425625ac93cad
SHA51295e833f7efbb6cd72cc29d47f7eb8662b91a25a477d9eeb1393cf512d7bc21da981523b9752ea0a51d8687b5f16ca85b0e575fd3d6a74eaf907cc825607fe9b8