Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe
-
Size
234KB
-
MD5
37c90b223266839f2bd1d857968248ad
-
SHA1
5aa80d64abea48916ee404ce1068f546bfaca43a
-
SHA256
7e4fff4af0626025912656296147d2501b1409bd006e15b567d23312416aac12
-
SHA512
71bed080f4fd19d13a48e58b4cf0a8260e41131e14c66b9ebf2392cc4296a353969e51ae081a2b9d1d9e904e4132269b951d1a4c6e4f9770d3273777a71f9da7
-
SSDEEP
768:cJjSO7E4+l8raRcW8XJk/GLr1Ep+GtAO1yJ/EDufyXCMg3Q1RU:wW4+ayaZk/GLr1e+Gv1yJ/Emg5g3ya
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\winlogon32.exe" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\smss32.exe = "C:\\Windows\\system32\\smss32.exe" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss32.exe = "C:\\Windows\\system32\\smss32.exe" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\winlogon32.exe 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe File created C:\Windows\SysWOW64\smss32.exe 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\smss32.exe 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\PhishingFilter 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Software\Microsoft\Internet Explorer\PhishingFilter 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\Enabled = "0" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe -
System policy modification 1 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetActiveDesktop = "1" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\NoChangingWallpaper = "1" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoActiveDesktopChanges = "1" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37c90b223266839f2bd1d857968248ad_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer Phishing Filter
- System policy modification
PID:3780
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1