Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 21:08

General

  • Target

    7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe

  • Size

    1014KB

  • MD5

    7341ca82446f36bb3b35c5b54eb4f3af

  • SHA1

    82a1a522091de9c10b2c704d987c917adffb4848

  • SHA256

    508bf4b3e54c5650c1cfcf2a4c5e0e7f4d88810509d7c2be72e286689b193683

  • SHA512

    f186120017d2b168d9d90c7535f2342bd1afee0c6ce3d54716904142d5fdd21bb0a7d31900881b075f4416470520114f80b721b7d20363482b4d08a8e3c5dac1

  • SSDEEP

    24576:XyIAthWCdFF9cjKgoU9mEnAHHws4f95RrTMmPEMP:XyHtLpgoQbdT7Ea

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4344
    • C:\Users\Admin\AppData\Local\Temp\is-9GT60.tmp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9GT60.tmp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp" /SL5="$70170,712548,242688,C:\Users\Admin\AppData\Local\Temp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://thebestoffersintheweb.com/redirect/57a764d042bf8/
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4796
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc0446f8,0x7ffcfc044708,0x7ffcfc044718
          4⤵
            PID:2744
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
            4⤵
              PID:3312
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2228
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:8
              4⤵
                PID:2480
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                4⤵
                  PID:1392
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                  4⤵
                    PID:2184
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:1
                    4⤵
                      PID:100
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:8
                      4⤵
                        PID:4792
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3596 /prefetch:8
                        4⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3724
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:1
                        4⤵
                          PID:364
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:1
                          4⤵
                            PID:4392
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1
                            4⤵
                              PID:3744
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:1
                              4⤵
                                PID:2716
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,14231335406716129491,16663389892639084373,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2312
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4256
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1316

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

                              Filesize

                              1KB

                              MD5

                              55540a230bdab55187a841cfe1aa1545

                              SHA1

                              363e4734f757bdeb89868efe94907774a327695e

                              SHA256

                              d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

                              SHA512

                              c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

                              Filesize

                              230B

                              MD5

                              732361ba70a2791b255aa75ea038bdd2

                              SHA1

                              60c52b70b99bf2a530df899e7cd294947af761e1

                              SHA256

                              4acc0f5c2eb50b9f99a7b588fc4814daf3aafa4af16390648665c2f950b3a8ca

                              SHA512

                              55508b4b9211e94fc6f1ace57f300494c0de56780cc3c5d5c66a7166cd14f279226d1b54836cb6f8bc31be7088a9dc77a7a830c9e3d7bfce10c2031831af8b71

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              ecdc2754d7d2ae862272153aa9b9ca6e

                              SHA1

                              c19bed1c6e1c998b9fa93298639ad7961339147d

                              SHA256

                              a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7

                              SHA512

                              cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              2daa93382bba07cbc40af372d30ec576

                              SHA1

                              c5e709dc3e2e4df2ff841fbde3e30170e7428a94

                              SHA256

                              1826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30

                              SHA512

                              65635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              456B

                              MD5

                              829b319b786d11fadbdef51a869aab8a

                              SHA1

                              671d70a0436536c2a704fc7399b57bb4eabcb2b1

                              SHA256

                              d2e63cb941ddc59fa5b4d4ffc50bb00da2b1bfc34ef9f92b1739f7932ee36cf9

                              SHA512

                              12d3de6e0a7dc0e42855bb0d577557dd7ed745d6826d5f7d94dda008621fe9fbd2f32178474273df389b69812f04ffc2db0ccfb48b28e8a9313f42331f32e63e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              680B

                              MD5

                              962aa000ec529b5744a956903146110d

                              SHA1

                              39665973c0e81b5efb0d65dc6ad65e95783a6795

                              SHA256

                              4934954c0f48ebfcd2338f25b703c25722664e4de2e8296262983e60eac57a96

                              SHA512

                              ff1fff00539db8cd18cebc3f7634c23365d72ac7c5e638d794eea96d0f1a6fb3df1129d3ecddbfde7322f0ef83ef1de02d085800b1546aa01cce5f1f2f61b943

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              59cab04fd271d0a1fbbf8134ed6261f0

                              SHA1

                              41ab48aa0683076c4cb4890c293892c76b5078f7

                              SHA256

                              89c7824f18ac34f33467846a5cc4ebcd018cf421bbfeb8af9b7e75e605ba848e

                              SHA512

                              f84484d78064561b4ccc18e5cadf3c3739ef4d2ce2d4d844f520a7f5a569dd998d2f2e8b0a5105deb0fd63e6db8ee5ab636037b4c30ff79d569e67dce8d3141e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              aa54740b86bae3ee9341c695b9f09d1d

                              SHA1

                              39021891f24b4bcf6db5140418bbd9f3b8571862

                              SHA256

                              555d818ad872262ae6a1ca0d8756e38d126bad8138a3787dc0058c58b30e9ca4

                              SHA512

                              c8857eef7714f6dbccdc84b8b6a01caab989eedd91eff000d500147125d6c813f60e671b1f6f43470d46b0a6e0b4798f8545e8c3493162d9dc532b55f370eb89

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              024d7e28a684f37154958ea567a37926

                              SHA1

                              2c19426592e77e2eb8d8db731a6fc4269a41eda8

                              SHA256

                              a553f6e2f3f572de18ed77b2b26bded0ce2c59e3dc522eafd5602ce1bfd31028

                              SHA512

                              f948d586c243b71598989a8be1ce740af0cb9b9b6b00138e9eae033036e3a6f4ec5bf5ab8c006a441772c14c04429f95c6a877bfe20b7a8169f4bdec78480390

                            • C:\Users\Admin\AppData\Local\Temp\is-9GT60.tmp\7341ca82446f36bb3b35c5b54eb4f3af_JaffaCakes118.tmp

                              Filesize

                              882KB

                              MD5

                              1c3c22290c0994070ff675ae9417e807

                              SHA1

                              7070cc4f6311b379820fdf6edcbc98f8ad1bd4f1

                              SHA256

                              5acf67f9dfdf0fc1ca934e9cc1096e96cf95e325341e99482badd2d49be8685b

                              SHA512

                              3792d52851202866e7fa51bc496a672e337a96beaed4010946bcaf5cff30afd18339867ebff3c7a78be01747ea0e3b07528d9befbad75885547ba4185d6f52fe

                            • C:\Users\Admin\AppData\Local\Temp\is-KG1GP.tmp\_isetup\_isdecmp.dll

                              Filesize

                              29KB

                              MD5

                              fd4743e2a51dd8e0d44f96eae1853226

                              SHA1

                              646cef384e949aaf61e6d0b243d8d84ab04e79b7

                              SHA256

                              6535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b

                              SHA512

                              4587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d

                            • C:\Users\Admin\AppData\Local\Temp\is-KG1GP.tmp\idp.dll

                              Filesize

                              216KB

                              MD5

                              b37377d34c8262a90ff95a9a92b65ed8

                              SHA1

                              faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                              SHA256

                              e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                              SHA512

                              69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                            • C:\Users\Admin\AppData\Local\Temp\is-KG1GP.tmp\itdownload.dll

                              Filesize

                              198KB

                              MD5

                              6ac939f80346082a2f34774953fd3dcb

                              SHA1

                              0c66ecb9110cc5d4c9c833f3b3ad35aed2c4b8ca

                              SHA256

                              dfd62d0755555778583f86521a6806c2e4053c5f282287c149183123085798d8

                              SHA512

                              660248bff3048ac43363eeff63eea93287017a2dc60bb9744764e777b40bcac20d522bc77c0a2060d4737a1244338019864a6e22215942e5ddd0f84843a03c59

                            • C:\Users\Admin\AppData\Local\Temp\is-KG1GP.tmp\psvince.dll

                              Filesize

                              42KB

                              MD5

                              d726d1db6c265703dcd79b29adc63f86

                              SHA1

                              f471234fa142c8ece647122095f7ff8ea87cf423

                              SHA256

                              0afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692

                              SHA512

                              8cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4

                            • memory/1032-27-0x00000000038E0000-0x00000000038EE000-memory.dmp

                              Filesize

                              56KB

                            • memory/1032-129-0x0000000000400000-0x00000000004EC000-memory.dmp

                              Filesize

                              944KB

                            • memory/1032-130-0x00000000038A0000-0x00000000038DB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1032-21-0x00000000038A0000-0x00000000038DB000-memory.dmp

                              Filesize

                              236KB

                            • memory/1032-12-0x0000000000400000-0x00000000004EC000-memory.dmp

                              Filesize

                              944KB

                            • memory/4344-128-0x0000000000400000-0x0000000000442000-memory.dmp

                              Filesize

                              264KB

                            • memory/4344-0-0x0000000000400000-0x0000000000442000-memory.dmp

                              Filesize

                              264KB

                            • memory/4344-2-0x0000000000401000-0x000000000040C000-memory.dmp

                              Filesize

                              44KB