Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe
-
Size
747KB
-
MD5
322fb9825ef9cb13d6486654fe2b846f
-
SHA1
6b35c9af64204cd71f123d1efb38e4039d6dfe26
-
SHA256
12dae350239569e85555f1fdd052d263526e8e5c67b12a1b6a65ee3c4d9af3d2
-
SHA512
cc781799aff15986d0208d2a109615269b8dd1f051f3483179d9f97603b652642e1cc1329d168f9ddf4514271195f44850bb6545b484afe43e09c404cae81f4c
-
SSDEEP
12288:U8F2GlKL2ioCvszUyYoCt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Bao5:U8EGALzohzUy2NJvhjyR4kKJRi0+4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00080000000171a6-4.dat acprotect behavioral1/files/0x0007000000017389-20.dat acprotect behavioral1/files/0x0007000000017391-22.dat acprotect -
Deletes itself 1 IoCs
pid Process 2588 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 PrstService.exe -
Loads dropped DLL 5 IoCs
pid Process 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 2892 PrstService.exe 2892 PrstService.exe -
resource yara_rule behavioral1/files/0x00080000000171a6-4.dat upx behavioral1/memory/1760-6-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/files/0x0007000000017389-20.dat upx behavioral1/files/0x0007000000017391-22.dat upx behavioral1/memory/2892-32-0x0000000000350000-0x0000000000374000-memory.dmp upx behavioral1/memory/2892-26-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1760-42-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/2892-57-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\PrstService.exe 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PrstService.exe 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe File created C:\Windows\SysWOW64\PrstService.dll PrstService.exe File opened for modification C:\Windows\SysWOW64\PrstService.dll PrstService.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe File created C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File opened for modification C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File created C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File created C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File created C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\PrstService.jpg PrstService.exe File opened for modification C:\Windows\Fonts\PrstService.jpg PrstService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" PrstService.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426725492" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E5D95B1-3E41-11EF-AC89-C644C3EA32BD} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 2892 PrstService.exe 2892 PrstService.exe 2892 PrstService.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 2892 PrstService.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2892 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2892 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2892 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 30 PID 1760 wrote to memory of 2892 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 30 PID 2892 wrote to memory of 2116 2892 PrstService.exe 31 PID 2892 wrote to memory of 2116 2892 PrstService.exe 31 PID 2892 wrote to memory of 2116 2892 PrstService.exe 31 PID 2892 wrote to memory of 2116 2892 PrstService.exe 31 PID 2116 wrote to memory of 2836 2116 IEXPLORE.EXE 32 PID 2116 wrote to memory of 2836 2116 IEXPLORE.EXE 32 PID 2116 wrote to memory of 2836 2116 IEXPLORE.EXE 32 PID 2116 wrote to memory of 2836 2116 IEXPLORE.EXE 32 PID 1760 wrote to memory of 2588 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 33 PID 1760 wrote to memory of 2588 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 33 PID 1760 wrote to memory of 2588 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 33 PID 1760 wrote to memory of 2588 1760 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 33 PID 2892 wrote to memory of 2116 2892 PrstService.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\PrstService.exeC:\Windows\system32\PrstService.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\delus.bat2⤵
- Deletes itself
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507738a81e9d5a505c91c5c75bb129d57
SHA118b218d317b315ae712ce2d74451037fbb95b1f6
SHA2565c059f20aeb0c56bf5f9ba1d525a0005431b42f29e3c68dd340021247bcba2bb
SHA51297f0de9232b2751264e81174824e9662d477efed66e11f40abc9e4a8543971718e1bb91a78bee930fda4b25214da33f38c9795f5670eee90d6679c291d86a940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56722b9bb80f1a4029fcdf6e0e7185ff1
SHA14ba38607013674e9f87a47e8e13a516e6b60192d
SHA256ed0710d20b42d3509eda87ee408c2704de39f6e4cd04f3cf6b2412705b278f6f
SHA512cfed541520bd4e55a410748d4f8fa75be5edee339bad1aea63b94d6afd79821091f21fc5786dcd43f3f922216591db0d9e5473650e64202a326499f0ec93b9f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549fbdb82ebf8843d24ba018cdd6267dc
SHA11e731bbd1663c2261ad1c145ec74529eb732e876
SHA2564c4994d161d2720d884cad5f856108f295449dc8abd48783a1ddfe1f909c6f8f
SHA5129da7eb16381342b610b12ab90ea443cd25461eb5bcc076b7e273499b0a3efe0a9d58a3a70841e14292616ec071f20102eb812d801d7aae2f7b7c98f5a1ba280d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb154af49f285e2defca6c13243eb84
SHA1f58317f480e22309ab0da8b3c68dc33a4b034ac1
SHA2569ff207ee0694706e68b0e3b9ed3fe13734c15b340193855de94dcf1aa599b61c
SHA512f2ea4c80dc27df228a4cf233e9a3613eae70f867109ca83c9dba8dd9ec5efcf81355c601bb636fc01ecf73b74b78809367e362f9241bb3f63a0162afa4730b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50894a490a3cef1abd066143401a950
SHA192539979fdd6e65404bc99c02a841dddac9d7da7
SHA2568e92edd4c7e471cb46c44e45e311e1e00cb4a931e9b464d615111555b75c9979
SHA51223fa13933c9a347e8ae2764899d9fa3a9d78e3170a50147d58d2ad16ecd16584827ee566b04e3f5482e065779de3a66e707d26e4923d20334fd65a97ffd672e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b792d015608b17bc6f7a563417803874
SHA1f0e0f4d699abbb215a9913ad8eed6231c6ff8ffb
SHA25696e7c3ff84f7dd8fbce3592077d2ab7fb9ea6394034d3641b5a41f5e4a90ee03
SHA512c0fc81fd38aeb788c658018ee7f149e2f642fc0757235e81343a95235b596229fbb31f43f0253555ac74e157a413bf398f00ccb69d6f2d45327e9d3865147e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537be70bfb2bdfce7ebf8d73b58c59257
SHA17c2bd1a146664508fb0801f26ea77758e59e5b82
SHA25604ac2948154df19aff42e062882e283f58148d186f90e3c7de14f105e44b8240
SHA512d298d7359853e1ec5a08c12a0696d49e18f54c8748e9bc76f24a461f089f11bed0b3cf58cff7cff3976c041f22000b168e5dbcaaa62f4ec537f78a13b57e94ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b8165f448d89b64ce1a14280907c98e
SHA137c66a51ac4ddda8ad60417f92319d62f4a4a362
SHA256dceedf98a46c273b9da1dfb77cc7828e2245e22dafe1538c72d9fa5d9185baaa
SHA5129def7121f7fb3ff4d310dbf64b71f85a846bc8ca8f28be750ac26b454a22227e2dbcf337cd697897b68c0ddb0045ae35d186e479a517cca7d253e4967127422a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414d1de0f6b6efaa51d1767322ced09f
SHA11cb5ccbc48a79a4673823a9443f10b200854d37e
SHA256b4af10545a4638c93ef1ca0d4fa204eac35a8cd74c57134d96e64416ad1dbaff
SHA5122d7d835000883abfc603558562088b99fc1a4c2ec923cfc4469328f20a811630cfdcd556236298f2a2bed19573b83438e993c5996cb85108ca25c440f56c0cdf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
230B
MD5881079fdf538000b6156d02a83cc2429
SHA1faa14b89ec39c3ee7789bf688481ff0321b024f8
SHA25653eb1fb8a38d3104769c827b2665d723c4450a21e639887170554e28c6e2a501
SHA512d3c7819a7608c997c0eeceb5ab8e32e074ea5ec16578d88966b58a9f6120a5fcbbcb0f2bc1a66dc9cba40e19f8ac66a60056b0813fcc4bc61850efb1d31609d3
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
747KB
MD5322fb9825ef9cb13d6486654fe2b846f
SHA16b35c9af64204cd71f123d1efb38e4039d6dfe26
SHA25612dae350239569e85555f1fdd052d263526e8e5c67b12a1b6a65ee3c4d9af3d2
SHA512cc781799aff15986d0208d2a109615269b8dd1f051f3483179d9f97603b652642e1cc1329d168f9ddf4514271195f44850bb6545b484afe43e09c404cae81f4c