Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe
-
Size
354KB
-
MD5
23f62fe026e1632b60e9bb0dc7857537
-
SHA1
b790dbc0dd1bf407df7e92a65cc20ae1e76d487d
-
SHA256
b7c18eb1f6597734af890ebb5fa3345bc3c90ba6f60cb934025c3d56343a63da
-
SHA512
78e6cc5891d0f2f4e7b0b01a1837f8651157962c6535d6ed68a9d5f96fb4da879fb5058ea4990a021922e02ef1f59bab14c78959dfe89aa0a9634e5d593ba34b
-
SSDEEP
6144:gDCwfG1bnxLERR9saMDCwfG1bnxLERR9saah:g72bntEL9/M72bntEL9/ah
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hosts.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hosts.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\BVRKIPTS = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\BVRKIPTS = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\BVRKIPTS = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 6 IoCs
pid Process 3212 avscan.exe 3908 avscan.exe 3556 hosts.exe 3320 hosts.exe 2964 avscan.exe 4296 hosts.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys REG.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\windows\W_X_C.bat 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe File opened for modification C:\Windows\hosts.exe 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe File created C:\windows\W_X_C.vbs 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 9 IoCs
pid Process 4964 REG.exe 2644 REG.exe 2216 REG.exe 940 REG.exe 1124 REG.exe 2880 REG.exe 4996 REG.exe 1092 REG.exe 5048 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3212 avscan.exe 3556 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 3212 avscan.exe 3908 avscan.exe 3320 hosts.exe 3556 hosts.exe 2964 avscan.exe 4296 hosts.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4996 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 80 PID 5040 wrote to memory of 4996 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 80 PID 5040 wrote to memory of 4996 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 80 PID 5040 wrote to memory of 3212 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 82 PID 5040 wrote to memory of 3212 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 82 PID 5040 wrote to memory of 3212 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 82 PID 3212 wrote to memory of 3908 3212 avscan.exe 83 PID 3212 wrote to memory of 3908 3212 avscan.exe 83 PID 3212 wrote to memory of 3908 3212 avscan.exe 83 PID 3212 wrote to memory of 4224 3212 avscan.exe 84 PID 3212 wrote to memory of 4224 3212 avscan.exe 84 PID 3212 wrote to memory of 4224 3212 avscan.exe 84 PID 5040 wrote to memory of 3260 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 85 PID 5040 wrote to memory of 3260 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 85 PID 5040 wrote to memory of 3260 5040 23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe 85 PID 4224 wrote to memory of 3556 4224 cmd.exe 88 PID 4224 wrote to memory of 3556 4224 cmd.exe 88 PID 4224 wrote to memory of 3556 4224 cmd.exe 88 PID 3260 wrote to memory of 3320 3260 cmd.exe 89 PID 3260 wrote to memory of 3320 3260 cmd.exe 89 PID 3260 wrote to memory of 3320 3260 cmd.exe 89 PID 3556 wrote to memory of 2964 3556 hosts.exe 90 PID 3556 wrote to memory of 2964 3556 hosts.exe 90 PID 3556 wrote to memory of 2964 3556 hosts.exe 90 PID 3260 wrote to memory of 3724 3260 cmd.exe 92 PID 3260 wrote to memory of 3724 3260 cmd.exe 92 PID 3260 wrote to memory of 3724 3260 cmd.exe 92 PID 4224 wrote to memory of 1552 4224 cmd.exe 93 PID 4224 wrote to memory of 1552 4224 cmd.exe 93 PID 4224 wrote to memory of 1552 4224 cmd.exe 93 PID 3556 wrote to memory of 4660 3556 hosts.exe 94 PID 3556 wrote to memory of 4660 3556 hosts.exe 94 PID 3556 wrote to memory of 4660 3556 hosts.exe 94 PID 4660 wrote to memory of 4296 4660 cmd.exe 96 PID 4660 wrote to memory of 4296 4660 cmd.exe 96 PID 4660 wrote to memory of 4296 4660 cmd.exe 96 PID 4660 wrote to memory of 4812 4660 cmd.exe 97 PID 4660 wrote to memory of 4812 4660 cmd.exe 97 PID 4660 wrote to memory of 4812 4660 cmd.exe 97 PID 3212 wrote to memory of 2216 3212 avscan.exe 101 PID 3212 wrote to memory of 2216 3212 avscan.exe 101 PID 3212 wrote to memory of 2216 3212 avscan.exe 101 PID 3556 wrote to memory of 1092 3556 hosts.exe 103 PID 3556 wrote to memory of 1092 3556 hosts.exe 103 PID 3556 wrote to memory of 1092 3556 hosts.exe 103 PID 3212 wrote to memory of 940 3212 avscan.exe 111 PID 3212 wrote to memory of 940 3212 avscan.exe 111 PID 3212 wrote to memory of 940 3212 avscan.exe 111 PID 3556 wrote to memory of 1124 3556 hosts.exe 113 PID 3556 wrote to memory of 1124 3556 hosts.exe 113 PID 3556 wrote to memory of 1124 3556 hosts.exe 113 PID 3212 wrote to memory of 5048 3212 avscan.exe 115 PID 3212 wrote to memory of 5048 3212 avscan.exe 115 PID 3212 wrote to memory of 5048 3212 avscan.exe 115 PID 3556 wrote to memory of 2880 3556 hosts.exe 117 PID 3556 wrote to memory of 2880 3556 hosts.exe 117 PID 3556 wrote to memory of 2880 3556 hosts.exe 117 PID 3212 wrote to memory of 4964 3212 avscan.exe 119 PID 3212 wrote to memory of 4964 3212 avscan.exe 119 PID 3212 wrote to memory of 4964 3212 avscan.exe 119 PID 3556 wrote to memory of 2644 3556 hosts.exe 121 PID 3556 wrote to memory of 2644 3556 hosts.exe 121 PID 3556 wrote to memory of 2644 3556 hosts.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23f62fe026e1632b60e9bb0dc7857537_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Impair Defenses: Safe Mode Boot
- Modifies registry key
PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat5⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\windows\hosts.exeC:\windows\hosts.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4296
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"6⤵
- Adds policy Run key to start application
PID:4812
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:1092
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:1124
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:2880
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
PID:2644
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
PID:1552
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:2216
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:940
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:5048
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:4964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
PID:3724
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
354KB
MD5800e5aabbfaba2ac1e54c595faf04cc8
SHA16113dc33c0ef59de8252d8fa9885f1a255445285
SHA256a9c4bf696e0cdf88d2760eb9359de4271dc305a08df34fd16eb6cf71ef96735e
SHA51204e6db78b32b216296ef061cd6c244c60ac60c00bf3bbd4d162c4f852e560ea01fde38ca5266003d5d9faf2df93d61a39b48bca08991ef123646ff8d04316dc0
-
Filesize
195B
MD52bf5a187f48b0e3c967d35345b39cf75
SHA15dc7cfa3b9818baa039314fd49d38825a88f30f2
SHA2569676e777e8eec50aa91525d3c0ed7c17047ddf363cb28a83a474c2840cd4c7b1
SHA5121f0c2d5fadc2304f910caf7569a968b1824687cb57dd8f470dc67b8262cb009809c83ea626f2f99d9ce4e8113efb46c53b979f6dc3113433f7503ca4d119e16c
-
Filesize
354KB
MD5e516ef44a32d708c566c45acea2fc4cb
SHA1b1029bc936eac31bee9431e149d2faffb982f141
SHA256e57c0105ac6e64b86e4b625d20798bf4bc05635b5b6e157933ba886c2201e62e
SHA512b9b7b83d11dfbf2c01859b84cfe7a075c299570200b4299740e08e5e6b0f1b4447866f46eeeaeefebb8be6a0146c65e3f01387de6731d66300b32eda085e834b
-
Filesize
336B
MD54db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b