Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2025, 23:02
Behavioral task
behavioral1
Sample
JaffaCakes118_7259b70bc77be2353bec4ba13a276698.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7259b70bc77be2353bec4ba13a276698.html
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_7259b70bc77be2353bec4ba13a276698.html
-
Size
127KB
-
MD5
7259b70bc77be2353bec4ba13a276698
-
SHA1
ec802b7242d8b00482cde662e560c9c722cbb6c5
-
SHA256
509cabbb2ef967beb2d4151e55de9f207a0c68d1b997314e61fcc558cfe7618a
-
SHA512
5ef163ae17aaaf6f6d300be671ff587af4cd40d7c025860dfc11c5a1f8de22f3096a97cde886d03251d17f4aa27029793ba5ef603b2a15f2ca3fe4f1466b90e8
-
SSDEEP
768:2Ek1ATx+Bw24Tp7VDiqidNCiZW0HI8Jj2ECFcsm0IXWhCFAmmv1p4ODMtFA6cVx1:2wHDiCiZdIdECZpZDMtFbcDODtkCM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4764 msedge.exe 4764 msedge.exe 3136 msedge.exe 3136 msedge.exe 748 identity_helper.exe 748 identity_helper.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 2640 3136 msedge.exe 89 PID 3136 wrote to memory of 2640 3136 msedge.exe 89 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 3400 3136 msedge.exe 90 PID 3136 wrote to memory of 4764 3136 msedge.exe 91 PID 3136 wrote to memory of 4764 3136 msedge.exe 91 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92 PID 3136 wrote to memory of 3576 3136 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7259b70bc77be2353bec4ba13a276698.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9352046f8,0x7ff935204708,0x7ff9352047182⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2760 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,2607293844391607114,8317067045650177026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556361f50f0ee63ef0ea7c91d0c8b847a
SHA135227c31259df7a652efb6486b2251c4ee4b43fc
SHA2567660beecfee70d695225795558f521c3fb2b01571c224b373d202760b02055c0
SHA51294582035220d2a78dfea9dd3377bec3f4a1a1c82255b3b74f4e313f56eb2f7b089e36af9fceea9aa83b7c81432622c3c7f900008a1bdb6b1cd12c4073ae4b8a2
-
Filesize
152B
MD50621e31d12b6e16ab28de3e74462a4ce
SHA10af6f056aff6edbbc961676656d8045cbe1be12b
SHA2561fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030
SHA512bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f
-
Filesize
395B
MD5657872f5a700e7550b766496d0650f0d
SHA12294483047dda07dc48dc6bb64196cd720376fcd
SHA2560b05b10237e01d8bbe011c63003c7d2f81edc8c369af1937006c5670f41a326d
SHA512e60ce9be71ca56f6aecea29fc1a0f604125162d7b381e2c38cc7857fb942a9e23af5e8c85c3659e45e877154c707636b3b59df80a464db432e9a98222bdb4300
-
Filesize
5KB
MD554244e3b45ce10f5e4dbe6e76674cf45
SHA1a734ee4e9c8ead38d23ca436192bc3363d5b1305
SHA2560f2e75c66702dd35b9fe7a5532ed2554988d710291f2d056269924473d70662b
SHA51203ee59375c19023546718798de062f2fcea235ae55679fc7f06ce691050b49ed6af545e3b742f307416827f762a919767ed93ed300d2352917e0403029b7d759
-
Filesize
6KB
MD551635890ce19aee0e0131a1f1c75d0b7
SHA1cddd2b69a94fe9f7e70e48029d8ec6a94268dc91
SHA256da703b35db7f00d02161504a0eed31fb4e5b23a588a1a52c3e88bb9af796f8b6
SHA512298df6c28eb2ba4cc349f69cd9176d35cc7c1805b8526475e60dd1fb0b369416c3e3b3fa9b80677e0b4cdcdaeed266d0672f6864695da6019a1fb01600ead70b
-
Filesize
6KB
MD50ea235b86d27ab9c41cd7061bf6999b0
SHA127a24b64df451f769b046b1cefcbadfedaea48f0
SHA2569a3e95d09e2c276b856a4ce7c8eccebc238d5cc47cfa9f1b6521a880bfc48ae1
SHA512afb464c75318d07fd05c9de20d7402cd0a2f6f9b88a50ee061663aae5e62910613ef40bab339c687a8e05d9c9a18271c33adbbe4c01ad18940393d3cc66bdd4e
-
Filesize
6KB
MD515f5b3aacd6b8c6b486d3fb8bc21fc85
SHA16af040025c39e849e3a974416d99131c5b242766
SHA256a5b35a8c45a4fa8a1d7a09ec4710a14fbf7b97a5ecb5facd7e5111baf45dec79
SHA5129d0a0deaa253ebf322eed5119eaada018652946fc726ad2f4e78d3bcb11997d06547328ff8378efa1c692712c0ecf9bbc7c53fabe3e354894f0d7d6bd13a2440
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56c5a7bc3374f3fdff2015ec7af8d7e63
SHA193c52c345c14ef8b83561e8d7ed43536efb6e170
SHA256bb53e887dd306c4a4da5f7caab5b546e51d5bed963ac6b996b135c27b086048b
SHA5127a0c02ffabff99b770608f8478b34fac00ec93a09fad01fb61ad732c875cdf15870e9080de2bca6d3eee407f0226bf99502740aea00ce78e8f42e86935ab8254