Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe
-
Size
351KB
-
MD5
f560bd10a1d8dce1a0c65d3c4ca728ea
-
SHA1
9521377f6df44705e0732759967d97c24d2936c5
-
SHA256
4e4eb36ffc85d36e3b6a5e820e20157e575bc4f2d9790b58ec4c614954cf9bea
-
SHA512
375cd11eb9a05d69d5791f9479cf556cf208ee64b1514c50602f65b79f023ea4bba1111110007b36115ddb5282c63375f4e5cd07e82ee239b1430aafe5df206e
-
SSDEEP
6144:tAFm5ovkVwJTBwKqRH18Ro29Rdm/ItQ6Xpgq/LsfO4qeT:6Fm5o8wJd9QonRg/IC6Xpf+p
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Hardware\Parameters\ServiceDll = "C:\\Windows\\system32\\wtluo.dll" rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 3176 rundll2kxp.exe 4456 rundll2kxp.exe 1088 RUNDLL2KXP.EXE 1476 f2.exe -
Loads dropped DLL 4 IoCs
pid Process 3176 rundll2kxp.exe 4456 rundll2kxp.exe 1088 RUNDLL2KXP.EXE 3872 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Program Files (x86)\\Common Files\\system\\Updaterun.exe" f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe -
Drops file in System32 directory 17 IoCs
description ioc Process File created C:\Windows\SysWOW64\wbem\ocmor.dll f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File created C:\Windows\SysWOW64\wbem\ibiwy.dll f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 RUNDLL2KXP.EXE File opened for modification C:\Windows\SysWOW64\ocmor.dll RUNDLL2KXP.EXE File created C:\Windows\SysWOW64\Score.txt RUNDLL2KXP.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies RUNDLL2KXP.EXE File opened for modification C:\Windows\SysWOW64\advport.dll f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE RUNDLL2KXP.EXE File created C:\Windows\SysWOW64\advport.dll f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rundll2kxp.exe f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wbem\ocmor.dll f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wbem\ibiwy.dll f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\WBEM\ocmor.dll RUNDLL2KXP.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 RUNDLL2KXP.EXE File created C:\Windows\SysWOW64\rundll2kxp.exe f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File created C:\Windows\SysWOW64\wtluo.dll f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wtluo.dll f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\system\Updaterun.exe f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\system\Updaterun.exe f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\f2.exe f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\TypedURLs\url5 = "http://www.3839.com/index.html" f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" RUNDLL2KXP.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" RUNDLL2KXP.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix RUNDLL2KXP.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3176 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 87 PID 4720 wrote to memory of 3176 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 87 PID 4720 wrote to memory of 3176 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 87 PID 4720 wrote to memory of 4456 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 91 PID 4720 wrote to memory of 4456 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 91 PID 4720 wrote to memory of 4456 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 91 PID 4720 wrote to memory of 3872 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 93 PID 4720 wrote to memory of 3872 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 93 PID 4720 wrote to memory of 3872 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 93 PID 4720 wrote to memory of 1476 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 96 PID 4720 wrote to memory of 1476 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 96 PID 4720 wrote to memory of 1476 4720 f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f560bd10a1d8dce1a0c65d3c4ca728ea_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\rundll2kxp.exe"C:\Windows\system32\rundll2kxp.exe" "C:\Windows\system32\wbem\ibiwy.dll",Export @install2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3176
-
-
C:\Windows\SysWOW64\rundll2kxp.exe"C:\Windows\system32\rundll2kxp.exe" "C:\Windows\system32\wbem\ibiwy.dll",Export @start2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4456
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\wtluo.dll",ExportFunc 10012⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
PID:3872
-
-
C:\Windows\f2.exe"C:\Windows\f2.exe"2⤵
- Executes dropped EXE
PID:1476
-
-
C:\WINDOWS\SysWOW64\RUNDLL2KXP.EXEC:\WINDOWS\SysWOW64\RUNDLL2KXP.EXE C:\WINDOWS\SYSTEM32\WBEM\IBIWY.DLL,Export 10871⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD52c9c3948edbbdb7015054eda23d1cca0
SHA114a6aa1d75dfdfc2fd213545f150c034b0f7286f
SHA256b75790e97df65e074970d9347148d60860328b91c6e0be08deacdc204b076fea
SHA51275c70cb432107b43e20f6df8dc9484deb60d0a4dd2bf7182686a56bc533aaf44862015f40a62d867224502a5a505611b4d90b5638cf86721fcca378098fa9e9b
-
Filesize
10KB
MD54936a6954ed59700a3c706f9094685ee
SHA1124edd171bfc8a5c7f5fcf2147f6ff43b705bb79
SHA256e598bcf79618ab6ab58b29b7a7f3e5fc01ce6c7dbefcaa308565d3d9168249fe
SHA5121ef09ed6a9b22d761981e759fa2089e9c461fda4a46cba66431817bc7b75451d4639e63cd3872a71c3bf123831983590075fc924424833adf0ef491056de32ea
-
Filesize
208KB
MD5900c0bb45c85a70270f3dc1a117f8328
SHA1f6b63309535ee4f59dea36876052a7be3af2a9b6
SHA25662d9688a5604c3179191a5bfa40947276acde6b67677ccf2d7ff1bda34dce295
SHA51249430da345bcdc2508947cd87733e4e899c5b2fe962d9a2422b868382b24999641189fccd4ad9583668200a3fb12e03c9e8750feab71c5b08c5aa2d9f723c61c
-
Filesize
210KB
MD51e9031aac592b931b6a820057eced7d8
SHA1d36bd3e6e858c647fde36b4bfe5920e89b9c5764
SHA2566e5d812a61b0b189f326cb3973823dc9a2282cf520b7384683766e646d973508
SHA5125c17b160446f0e34fe1c73f862d229344cd4dfbb0d24676e9ec61ad7092407accdaa0c5d5128858c7ca4f2a5a6919eb076cfd99eadbdaaa2c029178658883b06
-
Filesize
72KB
MD59c69ab1ef0d6c590551712b8ff768170
SHA10580693d42d53bb54fa070f596bfdaae568dab21
SHA2567870ca62debde599e4eb2a6fcd48cda4c2bd57f8b7c6af58827ae396492d3dca
SHA512ac39de8a788c1635bdf53549c303088ff92fa262608b645692b2d6d8709d4082f265ae5d86e7309a3b29d0f41532dd2c097e1414bb8f0c6703dfedbc8ad3302b