Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
699afa6cbfc80d06c7d540f8546e14f9
-
SHA1
dee3b07c18fc40289b54c712d7440cac3f20460f
-
SHA256
685640fb786620ccdab35a597df47e76b49f6b5841bb331279bf130608744df9
-
SHA512
342e174c5e2c00ce0dd8c18da4909ea9d89dd3df9abdd56f085ebcafd74883a6c323fbc46b1b7e0e87e540b5441362c7aa5d1e0fd34a60bbd1b79081c09031e9
-
SSDEEP
24576:MejDKKiDkY2+AhEcy1BirYZqXMrDjUm84QeP3CqkkkkkkkE:MeUDeyLZqcn3Cq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 464 msedge.exe 464 msedge.exe 1764 msedge.exe 1764 msedge.exe 2396 identity_helper.exe 2396 identity_helper.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe 1764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3696 wrote to memory of 1764 3696 699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe 85 PID 3696 wrote to memory of 1764 3696 699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe 85 PID 1764 wrote to memory of 4220 1764 msedge.exe 86 PID 1764 wrote to memory of 4220 1764 msedge.exe 86 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 3916 1764 msedge.exe 88 PID 1764 wrote to memory of 464 1764 msedge.exe 89 PID 1764 wrote to memory of 464 1764 msedge.exe 89 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90 PID 1764 wrote to memory of 2628 1764 msedge.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\699afa6cbfc80d06c7d540f8546e14f9_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://contrev.net/redir443.html2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb61246f8,0x7ffdb6124708,0x7ffdb61247183⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:23⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:83⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:13⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:83⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:13⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:13⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:13⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15871499483832102539,5582914638551084868,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD565c2e3d6d6ef8dfd923a099511955c01
SHA1b518948b0784f98921a151d8319e8eb5008fb610
SHA25632d3de6980f3230d02dfbcaf1c712b2b1e15c20aa42f02b7a440469573252ae5
SHA512bc3d62ba43d744f5a04ddd9495093da03d87a157f715c0182704540061c16b2cd816b283d97eb4320c2f84f801932641e0de5d87d8be032382b4b3a575122629
-
Filesize
1KB
MD5d5af57395ad6b2fcaf2ab9aacb8657ac
SHA1d4e66aca707682edc82ed56d477e35ee6214df85
SHA2566ed4b963aa39cc9d0e60ea8dc7bb1a853a048d8c26603d2d1416ee3e61f93e96
SHA512e31aaf7aebb2c42e7e15721126886df02daef8e3f59d61f298540397024fb210f622c418e1867c548493bf982e04a9251cf4123e08e16621cdaa2b25c13c433c
-
Filesize
5KB
MD5b46986ab0ce36cbdfbf601eb9f9b0c13
SHA138fd0ebdb8270ac8648c2dd98a927af0fb49fc6a
SHA256349058051e1f5cb52568ae6c3d77bc4892d81b3378beadcd4e30c39238f1e6a3
SHA512b1cbd7daf5dffab7d72f2a52f7c3a04350507cab97c49ef3b58456fab859f3df4a6768bb82e1b2be8fbe6c4dbf6fc95b099ee6614a29d31fa5b33a8f77b6a4af
-
Filesize
6KB
MD55a11d3741926bb93f9c1e9ba47abc6e7
SHA12be11b6cb41674a4cc05db087e5315a920e5b1b6
SHA2562db143fa65e26cc1fc2948ae5a8ad906fc5bbe82e6b9296c1fb63254059a1692
SHA5120b1ea98d03fe03c06ec8813b60b4769ede8338c360e36d8dd984f2b4043a5f0e854d81bb06f504267839e2d3ad33ddb3dc3a676b99c72d1c4d04a915369c8ede
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5cc381628c10ed6f10d6fff68fc780422
SHA182cf7adada3b43449d7af1b34977daffc2032467
SHA256598e21488b0625a9eb0863bb9336e9e057be79bc3fd569e9ea701804cd23835c
SHA512e4c374c742942ca2be0bef549e2313412e7da34231a7268c3167f4d9b67160ef11920a3f02b63dab1e84dcee577be775af45b62f33bfba7ba63eb616ccf15a81