Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 02:11
Static task
static1
Behavioral task
behavioral1
Sample
01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe
-
Size
236KB
-
MD5
01f360a1cca0f5ddad97cc3abc3006e4
-
SHA1
faa57b7525d42071a32cbadd9f6be8e03fe6d11d
-
SHA256
50652e512a4945c812eb1ad37f23f89fb004b95468568baf3d09daff99ed1ccf
-
SHA512
8fd257c495e1f056e1d8c4d6ec8f0419b0b2ba72d192627823befcc0507ee58b772ef9073c16cc5272bfb73bc7880353a62b652b0287dd193a7dbd7bf88e13c4
-
SSDEEP
6144:9Z5PmYk+XlDKZD+0J4VXdkJlOeSLZJ7kPu8+:9aYk+1CdCVtilONn
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4568 BcTool.exe 4120 GfxAcc.exe 2752 WinNetw.exe -
Loads dropped DLL 4 IoCs
pid Process 1628 Regsvr32.exe 4568 BcTool.exe 4120 GfxAcc.exe 2752 WinNetw.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LoadDBackUp = "C:\\Windows\\BcTool.exe" 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\3Dfx Acc = "C:\\Windows\\GFXAcc.exe" 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\vtnmsccd.dll 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vtnmsccd.dll 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe File created C:\Windows\SysWOW64\MSWinsck.ocx 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\TempRes.dat 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe File created C:\Windows\q216309.exe 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe File opened for modification C:\Windows\q216309.exe 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe File created C:\Windows\BcTool.exe 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe File created C:\Windows\WinNetw.exe 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe File created C:\Windows\GfxAcc.exe 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\ = "132497" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8D6EC643-4B2D-13D1-B2E4-0060975B8649}\Version\ = "1.0" 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\ = "0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8D6EC643-4B2D-13D1-B2E4-0060975B8649}\Version 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8D6EC643-4B2D-13D1-B2E4-0060975B8649} 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 Regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8D6EC643-4B2D-13D1-B2E4-0060975B8649}\0 = 709c75e1d374679883ad6dec90b4450ec05934b617490a 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32 Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 Regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\ = "Microsoft Winsock Control 6.0 (SP4)" Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWinsck.ocx" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} Regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} Regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWinsck.ocx" Regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 Regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 4568 BcTool.exe 4120 GfxAcc.exe 2752 WinNetw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3440 wrote to memory of 1628 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 91 PID 3440 wrote to memory of 1628 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 91 PID 3440 wrote to memory of 1628 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 91 PID 3440 wrote to memory of 4568 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 94 PID 3440 wrote to memory of 4568 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 94 PID 3440 wrote to memory of 4568 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 94 PID 3440 wrote to memory of 4120 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 95 PID 3440 wrote to memory of 4120 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 95 PID 3440 wrote to memory of 4120 3440 01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe 95 PID 4568 wrote to memory of 2752 4568 BcTool.exe 96 PID 4568 wrote to memory of 2752 4568 BcTool.exe 96 PID 4568 wrote to memory of 2752 4568 BcTool.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01f360a1cca0f5ddad97cc3abc3006e4_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32.exe /s C:\Windows\system32\MSWinsck.ocx2⤵
- Loads dropped DLL
- Modifies registry class
PID:1628
-
-
C:\Windows\BcTool.exeC:\Windows\BcTool.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\WinNetw.exeC:\Windows\WinNetw.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
-
C:\Windows\GfxAcc.exeC:\Windows\GfxAcc.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD555d096cf235ae6c4868e8c5efc207a28
SHA1ebb5d7aecf9b33f7f8f1926568162347fc992956
SHA25634d3083234954f1eef4dd4539ca094fa6d98da4043a4653a3c55b0d5e456fbbe
SHA5121867aa49e854afc0dd005e12b4e666a0c44f28947fbc3c7692bb004f9ff081b4fd1af7459407a3536847d4c8f3244be8705e35998b40aef258dff290b4ee4c44
-
Filesize
20KB
MD50a84b270ec2fc29715069b8aeec1d444
SHA17dfc7d42771fecd85f71fcb1fa44c88d56ca45df
SHA25613d2942c348c260b87ab0b8b518593c5872156db3e0fd8f80927f750de71f308
SHA512a4777d73c4be925974f283fbac4a025128dca0a3923ead207eb6f078ecc5e4bd17b636bea455b46c67821df8f928462d3b70388317d1abe3e5c132f37e00322f
-
Filesize
106KB
MD5851f34233b9ec424695815cad2a909d8
SHA105235076e55b1bfdf4f834d398c1044af5a734dd
SHA25678dcd52e2311d08fc405ac2b54686ee66dda4fa68994819ae3315172b27e1f7f
SHA512ee24454128b64883c324b00133af1f2814a023195907f0cb8b3a51300233fa27ebb02d68a7f41067f209837e6f7fa0ee1dcc7f7bf40a48fee9318cb335e38727
-
Filesize
20KB
MD53648c5a44c2df334a91557d34f7fd42e
SHA1ee3a7c066857754512189781ffc31953be1a815d
SHA2568d9dfcfdd8b37bf1a7f69d0476b5cd99f232a44d8de9e895c7d2c4f7e6bb3a61
SHA512178b644f8f6cb93a72d44d0ddcd23c6159b087b701d25e517b81da60e165c25e0bf12dd4235c1b44da45533d1fa80cbc0064fdfb8948a719036222e4c8e502bd