Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
412a332c8b824f95cff3a792a530fe81
-
SHA1
1d6f2b32fb21e69f97389e571d006aba3004a039
-
SHA256
49552cc67aee3878a71c54bb209e3628781716a99afc98e497cb1763c208560c
-
SHA512
904ddbd87c3a6f5881eb27c530cd5ac959ef81dba5dcba2a569c3a6a09860e790bd3846834f5ba525fcdaf060fab9528068c2bf43e77113064431ae7a1fccda2
-
SSDEEP
24576:cejDKKiDkY2+AhEcy1BirYZqXMrDjUm84QeP3Cqkkkkkkks:ceUDeyLZqcn3Ci
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 2796 msedge.exe 2796 msedge.exe 4304 identity_helper.exe 4304 identity_helper.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2796 3056 412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe 85 PID 3056 wrote to memory of 2796 3056 412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe 85 PID 2796 wrote to memory of 3064 2796 msedge.exe 86 PID 2796 wrote to memory of 3064 2796 msedge.exe 86 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 404 2796 msedge.exe 88 PID 2796 wrote to memory of 1888 2796 msedge.exe 89 PID 2796 wrote to memory of 1888 2796 msedge.exe 89 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90 PID 2796 wrote to memory of 1960 2796 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\412a332c8b824f95cff3a792a530fe81_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://makeasymoneyx.com/redir4.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff975c946f8,0x7ff975c94708,0x7ff975c947183⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:23⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:83⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:13⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:13⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:83⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:13⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:13⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:13⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:13⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1696 /prefetch:13⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:13⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,12562781168088058625,13165066050112487785,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5956 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD56376c1930795f54e64a65a7571ef1c8f
SHA1b60a532b5fc7c82dd1524585554387c5f37f315d
SHA25603added7f84b034e9fb012c2feef5dc12797d2afe4beb8fc3ea3f5663c6fdc06
SHA51297fe0416546589bd8c7fc1293b67e353cca8769cb12164b9f78303ee5784a182911377945c58d3792fd9a4a99f70d9ed3ed189d0040bc76b3588ef436e626978
-
Filesize
6KB
MD558d18dbb86e00748c3c91e880fcf9c52
SHA181cab04f81153a868dd359286eae8ca4791a3103
SHA256d099f5f985a36319b2f1670ea1fea04341c78feab3dbed793fb1027cd037a186
SHA51266e33bd8b2e80827f7a8498e24b8105577addff5b4936e57df44d38b6b03c5605135525c20b292a021fce78466b2872991ebcaa17f568f7a58226d4d5da667f8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b1c9656d84e8561f06ec3745b6493ce5
SHA1f6b03e36628bce5b1c0348c0e203e2a302423c81
SHA256e95c33460a949d871ca12b053fd430b40e2e88b9a7963fa7d3ca5fef7b39ac4d
SHA512d1f58706270d1fba8bf886f6d719530e90cf40c6569fa9725c24ba1475ff70fd8e46e1c1c652ca6716a9a156e6b9101289705bac810b59615086ab3a77e1067f