Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
23/05/2024, 18:29
240523-w4w7ssbh59Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/05/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
6bdea523ddaabc94af229d4ee7e22d49_JaffaCakes118.js
Resource
win11-20240508-en
General
-
Target
6bdea523ddaabc94af229d4ee7e22d49_JaffaCakes118.js
-
Size
74KB
-
MD5
6bdea523ddaabc94af229d4ee7e22d49
-
SHA1
f5f88b136a7ff380d753e2de901fc7f54e2a16a4
-
SHA256
5a64b0a16eaa89f61694c209d9f7b83f6ed6d2c0dc13a85f500d1019b7004f9d
-
SHA512
6abc16dd890422457560fe2c89fd03025bef92118cc4a6e6c100ebe5fa2f705918c8a0c69240af7a62c674c00d3edf09e4125fa01ee086ed03940902d4c6e36c
-
SSDEEP
1536:gPMd4PsBxwxQ9vMJZLHAxYpxzVde3kRCqgdHXDp7l7o+7LSj5+fPC8ql1040wkb4:qsLqgdHXDp7l7o+7LSjkfPC8ql1040wf
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2624 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe 2624 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 936 MiniSearchHost.exe 2624 vlc.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\6bdea523ddaabc94af229d4ee7e22d49_JaffaCakes118.js1⤵PID:2832
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:936
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:1228
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,1⤵PID:1364
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ExpandUnlock.mpv2"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5e9aa12ff0be6d995ed86f8cf88678158
SHA1e5ee38fc2ebef0fcbc3059dee29b39f7daf21931
SHA256f35cd8ef03ac924a59943c5dfffc31ab67a8b5aff272e9f47ff776aabc7ee561
SHA51295a67acd2a4784b87d73910c1f1f590937c9d9b901e98448556a37eb8137ae5f458f1c673d65a46cf7d6b90bee5fe6b102ce3eeac9e819062cd9c5c2418bcbfc