Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe
-
Size
34KB
-
MD5
f3d1bb1b55971c3647bc279bd561161a
-
SHA1
ed0d7508c88bd25d14fea9fa218b5d765d89891f
-
SHA256
e3a4bd2bec9ab0ac245996a22783c32f921e9688b5f216d6996188d9103c0fd4
-
SHA512
b520dd6b892705fee49b4304c19b0d87e1434d614953f74cc4b92ca8fd27d4dedb7985b8362c8823b7f375f545358f6df15b04188fb58b560c18cf64c9ec61dd
-
SSDEEP
768:WdjrSskr3yKptT12XgeVtvEKJiGbKCp/5IHnELNl1j3DojRHcZW:CfSsc3yKp2XgeHEWiW//GHnMl5DojRx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winvyy32.dll f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winvyy32.dll f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3265965135" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3268152788" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31100950" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31100950" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{EE4F6F22-FC09-11EE-ADB6-FE5B5C383FAD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31100950" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420047982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3265965135" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 948 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 948 iexplore.exe 948 iexplore.exe 4760 IEXPLORE.EXE 4760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 732 wrote to memory of 5048 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 87 PID 732 wrote to memory of 5048 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 87 PID 732 wrote to memory of 5048 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 87 PID 5048 wrote to memory of 948 5048 cmd.exe 90 PID 5048 wrote to memory of 948 5048 cmd.exe 90 PID 948 wrote to memory of 4760 948 iexplore.exe 93 PID 948 wrote to memory of 4760 948 iexplore.exe 93 PID 948 wrote to memory of 4760 948 iexplore.exe 93 PID 732 wrote to memory of 948 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 90 PID 732 wrote to memory of 948 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 90 PID 732 wrote to memory of 948 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 90 PID 732 wrote to memory of 948 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 90 PID 732 wrote to memory of 948 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 90 PID 732 wrote to memory of 948 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 90 PID 732 wrote to memory of 4196 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 97 PID 732 wrote to memory of 4196 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 97 PID 732 wrote to memory of 4196 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 97 PID 732 wrote to memory of 2788 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 98 PID 732 wrote to memory of 2788 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 98 PID 732 wrote to memory of 2788 732 f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:948 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4760
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\gos6699.bat"2⤵PID:4196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.bat"2⤵PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
307B
MD50fd4d534966c67300e09973b1bb6d52d
SHA13ef46ed3d77d748931e7ba89dfa99d4f21a957ea
SHA25647627d7af0a1ee8cc137dbe1212fe1cc15258ac761c16530adc9e92b953631b7
SHA512493ead11627bf5a7e81ebc62436427e5fcfb2b1ab0efc7a5e7b34a26902093a99ad5d4ba017130614ff6f40b3755a7b739aa376b97242c7bed455840124b3f03
-
Filesize
190B
MD57d9dbee7ea418a95db407eb148ffffd0
SHA19eb510aff6dcd0a5c92303a734469f9ad4633f5b
SHA2568f96d74778029e9ce95d634b99f001d142d70200fd5227ff4908f4c2658e5db0
SHA512c203abae8604e1768e05ae11de7382d39f60ae0bd6b3de1de7cd741be56a78b061794696fbb4c304103479c8ea7cd5d79c7054258f75637ce95aa5f9b59183ee
-
Filesize
24KB
MD55ecce9af16e14becfeb560dd03644b75
SHA171226ccdc066672c643a255ab45b52f5661a1dd7
SHA2565b5ae28ae7623e3a1800f3488354b706d16981b8f772ccec4b92fa4edfe4e748
SHA512c6e8d93b6060b5d9e0ba1842e937c8ac61d5f5390cf87db464ca3602106d590789c1fa1170cafc67d4a1451dcee4808271a2006bc412af6d3fd6609c5d4b1fbe