Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
062da5ec522ef2327980c5a01df9bb50
-
SHA1
52392d69ef4637c355932844d439c7088aaa3c93
-
SHA256
c3f12828a48bf02b217912410a4cd858d941dcb0114699239563693b9bc47a8c
-
SHA512
cb840a6441f80ace0c6e700f49ab1f134ac34f8ba77391e65ec7e3461e1bb060500eb8335bc7d0030606a54f1034ee7357f7a45e1df35b3adf2af6aeca594040
-
SSDEEP
49152:YhhJRihXvdFlIn9H9EzxrL6IJZFOsxpKv/4dbjgfhjQmhoKiGPwT3Ng:sMxb4o7XFOaKv/4afhjDiPT6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2896 winrar -
Loads dropped DLL 5 IoCs
pid Process 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\baidu.htm 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\baidu.ico 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Extensions\{F2C63239-A5DB-487B-B283-4132351E7AB6}\IeakPolicy 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Extensions\{F2C63239-A5DB-487B-B283-4132351E7AB6} 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Extensions\{F2C63239-A5DB-487B-B283-4132351E7AB6}\CLSID = "{1FBA04EE-3024-11d2-8F1F-0000F87ABD16}" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Extensions\{F2C63239-A5DB-487B-B283-4132351E7AB6}\Exec = "http://www.baidu.com/index.php?tn=mm667_pg" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Search 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Search\CustomizeSearch = "http://www.my180.com/Search.html" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Extensions 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main winrar Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MenuExt\¡¾°Ù¶ÈÒ»ÏÂ,Äã¾ÍÖªµÀ¡¿ 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MenuExt 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Search\SearchAssistant = "http://www.my180.com/Search.html" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\SOFTWARE\Microsoft\Internet Explorer\Extensions\{F2C63239-A5DB-487B-B283-4132351E7AB6} 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Extensions\{F2C63239-A5DB-487B-B283-4132351E7AB6}\ButtonText = "°Ù¶ÈÒ»ÏÂ,Äã¾ÍÖªµÀ" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Extensions\{F2C63239-A5DB-487B-B283-4132351E7AB6}\HotIcon = "C:\\Windows\\baidu.ico" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Extensions\{F2C63239-A5DB-487B-B283-4132351E7AB6}\Default Visible = "yes" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Extensions\{F2C63239-A5DB-487B-B283-4132351E7AB6}\Icon = "C:\\Windows\\baidu.ico" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MenuExt\¡¾°Ù¶ÈÒ»ÏÂ,Äã¾ÍÖªµÀ¡¿\Contexts = "48" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\MenuExt\¡¾°Ù¶ÈÒ»ÏÂ,Äã¾ÍÖªµÀ¡¿\ = "C:\\Windows\\system32\\baidu.htm" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.baidu.com/index.php?tn=mm667_pg" 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe -
Runs regedit.exe 1 IoCs
pid Process 2720 regedit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 winrar -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 2896 winrar 2896 winrar -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2720 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 28 PID 1912 wrote to memory of 2720 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 28 PID 1912 wrote to memory of 2720 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 28 PID 1912 wrote to memory of 2720 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 28 PID 1912 wrote to memory of 2896 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 29 PID 1912 wrote to memory of 2896 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 29 PID 1912 wrote to memory of 2896 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 29 PID 1912 wrote to memory of 2896 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 29 PID 1912 wrote to memory of 2896 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 29 PID 1912 wrote to memory of 2896 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 29 PID 1912 wrote to memory of 2896 1912 062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\regedit.exeregedit2⤵
- Runs regedit.exe
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\winrarC:\Users\Admin\AppData\Local\Temp\winrar2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD51f1fc87429d791bdb9f6af0b9316774c
SHA132e1068ef81486e82dc624603f6d59865aaf3770
SHA2567e8d6673cab96330d3bfc7ba6fb5fd7cfe67429e93a5c281989f33b27e84fd88
SHA5123079aa0aa3b92108d231c637a74957c30ed8763a696176ccf99eab6e08588b2c1ecd68b193fc2a1a262bec002367d1c37cb77a7059ea2229388568cadeec2988
-
Filesize
212KB
MD54c9e8f81bf741a61915d0d4fc49d595e
SHA1d033008b3a0e5d3fc8876e0423ee5509ecb3897c
SHA256951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129
SHA512cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7
-
Filesize
312KB
MD5936745bac5c873ab1a91478d27894626
SHA19ed92393f95692339ce03a8f1498f80c727e0555
SHA256edfbe514d330e942ecd50dd7331659d59df27668e762d5a00e43df67f5f08630
SHA51232d15337ab7a62ff25802c04bd782f5be36012f1a5251d962226a8e8e2daa7bc0a35b9cbfb67889d3b9dbc5f6cc51f924bae963ae12619249b22f2cc9aa2bbd4
-
Filesize
1.1MB
MD5cf46bb62a1ba559ceb0fad7a5d642f28
SHA180b63dd193e84bfacbe535587dd38471b8ea2c24
SHA256fe4bba1a99b332c8bbd196d3a2f3c78d9edc8f212842ff2efef17eba38427f67
SHA5121f71f31fdc1ef7695d7a6e79218a9192804178bb2af80486de4f8ff3d7e176860813a61fa265bf78fe4ff722a85b72798938d715d8a2a034ac759505197a1058
-
Filesize
40KB
MD5d54753e7fc3ea03aec0181447969c0e8
SHA1824e7007b6569ae36f174c146ae1b7242f98f734
SHA256192608ff371400c1529aa05f1adba0fe4fdd769fcbf35ee5f8b4f78a838a7ec9
SHA512c25ed4cb38d5d5e95a267979f0f3f9398c04a1bf5822dceb03d6f6d9b4832dfb227f1e6868327e52a0303f45c36b9ba806e75b16bd7419a7c5203c2ecbae838f