Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 18:23
Behavioral task
behavioral1
Sample
b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe
Resource
win7-20240611-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
7 signatures
150 seconds
General
-
Target
b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe
-
Size
661KB
-
MD5
b48c475f44d16e0b1bd0ed0c8afd043b
-
SHA1
dc4d8fa535fbb283a3346005b00eb5fafa6b8316
-
SHA256
22788b14f39fc06a3ece5f318beb5ee9f11ed7db4fe12e3289162d6ae537b2e5
-
SHA512
1e5b4fff0a6ea98290dd3f107a34c04059fa2a53d7285293291b1a7d97c918f91d1f62b0100f1cfb684f28a51cd36972f5f0afe8590217c05a4a7f2b1cebed25
-
SSDEEP
12288:uSI2A2u/WGo+n31k1OxVGL5xLz7MGuU/YuLW4htuM7Cy90Xg:/I72u/WGo41kSGtx37rYuLoyYg
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2372-0-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2372-3-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2372-4-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2372-7-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2372-8-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2372-10-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2372-11-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2372-12-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2372-13-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2784-14-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2784-18-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2784-19-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2784-25-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2784-26-0x0000000000320000-0x00000000004E0000-memory.dmp upx behavioral1/memory/2784-27-0x0000000000320000-0x00000000004E0000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2784 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe = "11001" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe = "11001" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe -
Modifies registry class 44 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F} b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32\ = "ole32.dll" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\ = "Setup.Application" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR\ b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID\ = "{017E057B-DACF-4A07-B878-E294565E3F90}" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\InprocHandler32\ = "ole32.dll" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe\"" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ = "Setup.Application" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID\ = "Setup.Application" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967} b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID\ = "Setup.Application" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90} b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\ = "Setup" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ = "ISetup" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\ = "{F126C9FC-9299-40F2-BD42-C59023AD1E7F}" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Setup.Application\CLSID\ = "{017E057B-DACF-4A07-B878-E294565E3F90}" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\FLAGS\ = "0" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F126C9FC-9299-40F2-BD42-C59023AD1E7F}\1.0\HELPDIR b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\ProxyStubClsid32 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{237FDFDB-3722-470E-8BA8-90196DABE967}\TypeLib\Version = "1.0" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\ProgID b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{017E057B-DACF-4A07-B878-E294565E3F90}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe\"" b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2784 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2784 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2784 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2784 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2784 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2784 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2784 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 2784 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2784 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2784 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2784 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2784 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2784 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2784 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2784 2372 b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b48c475f44d16e0b1bd0ed0c8afd043b_JaffaCakes118.exe" /adm /recovermode2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2784
-