Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3a936074587...18.exe
windows7-x64
6a936074587...18.exe
windows10-2004-x64
6$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...0_.dll
windows7-x64
1$PLUGINSDI...0_.dll
windows10-2004-x64
1$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...18.exe
windows7-x64
8$PLUGINSDI...18.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...16.exe
windows7-x64
4$PLUGINSDI...16.exe
windows10-2004-x64
4$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/Goog...69.exe
windows7-x64
4$TEMP/Goog...69.exe
windows10-2004-x64
4$PLUGINSDI...ll.dll
windows7-x64
1$PLUGINSDI...ll.dll
windows10-2004-x64
1$PLUGINSDI...5.html
windows7-x64
1$PLUGINSDI...5.html
windows10-2004-x64
1$PLUGINSDI...6.html
windows7-x64
1$PLUGINSDI...6.html
windows10-2004-x64
1$PLUGINSDI...7.html
windows7-x64
1$PLUGINSDI...7.html
windows10-2004-x64
1$PLUGINSDI...8.html
windows7-x64
1$PLUGINSDI...8.html
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 10:32
Static task
static1
Behavioral task
behavioral1
Sample
a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ButtonEvent.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/a/$_110_.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/a/$_110_.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/execDos.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/execDos.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/g/PF-Chrome-2018.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/g/PF-Chrome-2018.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/g/PF-Toolbar-2016.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/g/PF-Toolbar-2016.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
$TEMP/GoogleUpdateSetup_1.3.21.169.exe
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
$TEMP/GoogleUpdateSetup_1.3.21.169.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/g/gcapi_dll.dll
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/g/gcapi_dll.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/g/gcombo/ComboOffer_1025.html
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/g/gcombo/ComboOffer_1025.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/g/gcombo/ComboOffer_1026.html
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/g/gcombo/ComboOffer_1026.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/g/gcombo/ComboOffer_1027.html
Resource
win7-20240611-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/g/gcombo/ComboOffer_1027.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/g/gcombo/ComboOffer_1028.html
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/g/gcombo/ComboOffer_1028.html
Resource
win10v2004-20240508-en
General
-
Target
a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe
-
Size
18.5MB
-
MD5
a9360745871d11e86208dfc05389ed87
-
SHA1
88c09ba1d029e0c6188a9be0281f3decc728ffb3
-
SHA256
654eebb38506e36b159f0dda7b316e2b726548145a179cec49b32bb030d5aba8
-
SHA512
75e1fd50661e07cc75556bc569218dc2b964dda601f950444c5db2598919e521a537b4a2fba802c21330fe93967d958dff9ffde945d26230d3a591f8ad08888f
-
SSDEEP
393216:C80lVaVagn4Htq0c0M9BPU7R4f7epIhmFdvn992eISHz/K6vH901k:CnVaEgn4NqUyPU7yfOcmbvn72nST/1v7
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Loads dropped DLL 11 IoCs
pid Process 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe 2868 a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9360745871d11e86208dfc05389ed87_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5a736159759a56c29575e49cb2a51f2b3
SHA1b1594bbca4358886d25c3a1bc662d87c913318cb
SHA25658e75de1789c90333daaf93176194d2a3d64f2eecdf57a4b9384a229e81f874f
SHA5124da523a36375b37fa7bc4b4ccf7c93e1df7b2da15152edf7d419927aa1bb271ef8ba27fe734d2f623fcc02b47319e75333df014bed01eb466e0cd9ec4111ef53
-
Filesize
87KB
MD57f4f45c9393a0664d9d0725a2ff42c6b
SHA1b7b30eb534e6dc69e8e293443c157134569e8ce7
SHA256dbd8b6fdb66604a0a5e8efe269fbfa598e4a94dc146006036409d905209da42b
SHA5120c27f9ce615cbff3e17fd772ce3929ab4419d7432d96223b7eec1ba70953f2ac993404b954020247b52d7f7499212d44eb6f85da2e2676773cafe1ce89b390f9
-
Filesize
3KB
MD5079cca30760cca3c01863b6b96e87848
SHA198c2ca01f248bc61817db7e5faea4a3d8310db50
SHA2568dd37d3721e25c32c5bf878b6dba9e61d04b7ce8aec45bdf703a41bc41802dfa
SHA5123e25c10e3a5830584c608b9178ab062e93e0e9009a7d897bb5e3561180b0b0910bd4178063d982eb33806a005c93931ae2ec5be520ec0d0c9a7c452cb78fd6a8
-
Filesize
11KB
MD541a3c964232edd2d7d5edea53e8245cd
SHA176d7e1fbf15cc3da4dd63a063d6ab2f0868a2206
SHA2568b65fec615c7b371c23f8f7f344b12dc5085e40a556f96db318ed757494d62d5
SHA512fa16bd9d020602e3065afd5c0638bc37775b40eb18bfa33b4ca5babcc3e6f112ae7d43457a6e9685ddbe6e94b954a1dc43d1da7af9ca7464019a3f110af549c1
-
Filesize
4KB
MD5c1f778a6d65178d34bde4206161a98e0
SHA129719fffef1ab6fe2df47e5ed258a5e3b3a11cfc
SHA2569caf7a78f750713180cf64d18967a2b803b5580e636e59279dcaaf18ba0daa87
SHA5129c3cf25cf43f85a5f9c9ed555f12f3626ef9daeeedd4d366ada58748ead1f6e279fea977c76ae8bae1dc49bfd852e899cb137c4a006c13e9fcebf6e5e2926a4d
-
Filesize
1.4MB
MD55b4a90d8d2c61f0e6fe2ffef347696e9
SHA123a45252deeba6f0faff3e8a17d503d1ccc42009
SHA25689a90ef4e7db39e6c89f37527c66ca3ba14eee3ac3dc4fb40aae347fb2ed98b1
SHA512accbd10c1d7698c19db170ec0e42a955a71e9a6b3286307778969d581f6f1f27c6825d73caf8e9ec8e93208115659c1522a69923ac47ea9603b907f4843ae166
-
Filesize
348KB
MD52973af8515effd0a3bfc7a43b03b3fcc
SHA14209cded0caac7c5cb07bcb29f1ee0dc5ac211ee
SHA256d0e4581210a22135ce5deb47d9df4d636a94b3813e0649aab84822c9f08af2a0
SHA512b6f9653142ec00b2e0a5045f0f2c7ba5dbbda8ef39edf14c80a24ecab3c41f081eb466994aaf0879ac96b201ba5c02d478275710e4d08b3debc739063d177f7e
-
Filesize
71KB
MD561bc40d1fad9e0faa9a07219b90ba0e4
SHA15b5c3badedba915707000d2047eaf13f27b8925e
SHA25689e157a4f61d7d18180cb7f901c0095da3b7a5cc5a9fd58d710099e5f0ee505a
SHA512fa341aa975c471082b4b6c380f794d1e9ab3939382972cfb9e1dbb3491f68296ad1cedc8f03736921c8e133f62432997de29642e223c2a97f1cab5ce91d68af9
-
Filesize
9KB
MD52aba8f16eca82517460013a3de7cbf67
SHA13812192fa7b873f426c4b0d0d822b3c9d51aa164
SHA25660b85fad2477b8c0138067be3697290b280b9334cf408cb57894e3baae615d0d
SHA5124e059f70ef420c22d69199557ff3eab9e51fcefc75d220b057f1508f9566cd6251f9e06a8fe3695bf7d913ebabd2519ce52f485f2de9a5e4ab3ebc553b877fb0
-
Filesize
1.9MB
MD56f7e7f72f9a53c48dffdd70dfec4f88c
SHA1655d4791f4bffe14dbaf68b5bb8270e93fadbef7
SHA25622abd21cd2fe21133ec7329a71effe4d4b3181661f1e5cc5e269434c91b0a7b4
SHA512af0a9e6d0568ae388c93dc33660b1968390fa69ec796079b340a17ec6b7dfa06b70f537c18d6db61784d71f4feec13ac93fcd9735a49635f7689ab206cd43827
-
Filesize
4.9MB
MD5fb812a42fe0f4a54918fabf21b66f29a
SHA13e7d2434f5d62df838c15c4c4c0382a58f2b1819
SHA25654d26ce44c6c5482ede4d3d64b02f2c8fbd58cb51d9be50fc3889bc3769ae2a0
SHA5122950a32d38dea4465bc8949a6b39bba1854cb04e3b79164ef0e55c54510d60cf2aa24161b9fe256a6fb4b27bb5b1ea61110442a712681cc7d51630ae66f7666a