Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
e0936a7091bc255f0ed54059e5c216ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0936a7091bc255f0ed54059e5c216ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e0936a7091bc255f0ed54059e5c216ef_JaffaCakes118.exe
-
Size
388KB
-
MD5
e0936a7091bc255f0ed54059e5c216ef
-
SHA1
eba9e80d617f382c8b422638b96d487b4f224e9b
-
SHA256
5c429290e02f1fc48734281d3336de06c36140d940458b219d587ed19105faea
-
SHA512
7ac979aa4175f1c13ba2c32abb2e1de999044d81eb8a0394463e54b3110f498cfcc6a49985a2678f7e056a30ab12a914fc7f673a4be9c40eba26a84030ae1c9f
-
SSDEEP
6144:QmYOr9Ix8fKnoYIcZsLUFtoa6+6wAYrrlEd0VNj9BGWLm24agcOVJxC96ijj97d3:OOr9CDnohXIrrleIDBG5a3kJxC97jX3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0936a7091bc255f0ed54059e5c216ef_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 428 msedge.exe 428 msedge.exe 2848 identity_helper.exe 2848 identity_helper.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe 428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3200 wrote to memory of 428 3200 e0936a7091bc255f0ed54059e5c216ef_JaffaCakes118.exe 92 PID 3200 wrote to memory of 428 3200 e0936a7091bc255f0ed54059e5c216ef_JaffaCakes118.exe 92 PID 428 wrote to memory of 1072 428 msedge.exe 93 PID 428 wrote to memory of 1072 428 msedge.exe 93 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 4648 428 msedge.exe 94 PID 428 wrote to memory of 3532 428 msedge.exe 95 PID 428 wrote to memory of 3532 428 msedge.exe 95 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96 PID 428 wrote to memory of 2272 428 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0936a7091bc255f0ed54059e5c216ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e0936a7091bc255f0ed54059e5c216ef_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://br.msn.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf03e46f8,0x7ffcf03e4708,0x7ffcf03e47183⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:83⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:13⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:13⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4100 /prefetch:83⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4100 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:13⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4372 /prefetch:13⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:13⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:13⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2308 /prefetch:13⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:13⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4344931937238372504,7404384001220661511,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5604 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5edf1e168e0513af65463fa12a3bee5f7
SHA1100fdca7fb49efeeb68b966b831a7f4f70ce0953
SHA256208816f0cc2edf034e73c64b67e6d834d90567c34972385d113dc89be75b0d24
SHA512ee73846bc37940e9534c02e89d5af026056d4ad28741374019e23185a14c26dff19a9faae76e700b7df8454635eacffd87f812d837f03bb8cd605707c793118b
-
Filesize
6KB
MD5557bc93c94fc29e7995a6c498a98dc0a
SHA1d863cb31af7169aa4bccaac474d1e9097c9f82e6
SHA25624e57ee7273b1721599001eb4af42dfc00263647edc5ead455c954225309369d
SHA512c8504beb32cc4c485b42463855e6afb1e1a28838926a8db5dc99f1610c09f482b30eae79ec6e7398a5158f0f3348c058da17ea3b6b3439861d7960cbff9dc2f3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51d6abe5ff0943b6b0fd1db3e2d622aef
SHA15e12087ca9568e4856b70b2a6c106dc413c1ebda
SHA256cbf172e8cd43692c8bff10a6c6b3d92836b04d61f83a3d9e7412f90495c0c656
SHA5123489b2ae224385f735e54e74874ca9886a87f7a3064214a3f96d3d4ef65106d51101232606254395e7cc2f6aeb09ff31af4b88abd69af8f6b7af58de39731e6b