Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe
-
Size
45KB
-
MD5
2ae1676267039c16727bf25f624c51a0
-
SHA1
e86fdb3e58645365b4472131790c23de0ec56cb1
-
SHA256
cc91d838372d82e789e05698467ef34d6491d5b6fcf3450a3a16668068374394
-
SHA512
64339d1c89e8f91b088d94d367aa45afa2cb7af429262301e39b065c6b3faca5044fc709ba8aaa5cc169891d75caf78b574c5f370fe7333519bfb237e91331ac
-
SSDEEP
768:rMVvp3w/ZKldEsWiZ0ggt4rbRtoDLtpehEX8bJrcnwSKQdd6Mr2SWxb/zrFJnlQp:rMVvp3w/4SsWs3rsDLtpsJ1XQPrijMko
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctor.exe 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RStray.exe 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DrRtp.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QQDoctor.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RStray.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DrRtp.exe 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{356D62D0-3D14-11EF-BA70-EAA3B7AF2FC1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3484 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3484 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1220 iexplore.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1220 iexplore.exe 1220 iexplore.exe 3492 IEXPLORE.EXE 3492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1220 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 80 PID 1936 wrote to memory of 1220 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 80 PID 1220 wrote to memory of 3492 1220 iexplore.exe 81 PID 1220 wrote to memory of 3492 1220 iexplore.exe 81 PID 1220 wrote to memory of 3492 1220 iexplore.exe 81 PID 1936 wrote to memory of 3444 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 56 PID 1936 wrote to memory of 3444 1936 2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe"2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe" "http://www.qqqt8.cn/bw/install.asp?ver=081129&tgid=huiqu&address=EA-A3-B7-AF-2F-C1®k=1&flag=5eb2a6c511a00329530db3bff9a1f8b3&frandom=6373"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3492
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x244 0x3fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3484