Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe
-
Size
747KB
-
MD5
322fb9825ef9cb13d6486654fe2b846f
-
SHA1
6b35c9af64204cd71f123d1efb38e4039d6dfe26
-
SHA256
12dae350239569e85555f1fdd052d263526e8e5c67b12a1b6a65ee3c4d9af3d2
-
SHA512
cc781799aff15986d0208d2a109615269b8dd1f051f3483179d9f97603b652642e1cc1329d168f9ddf4514271195f44850bb6545b484afe43e09c404cae81f4c
-
SSDEEP
12288:U8F2GlKL2ioCvszUyYoCt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Bao5:U8EGALzohzUy2NJvhjyR4kKJRi0+4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023443-4.dat acprotect behavioral2/files/0x0007000000023447-15.dat acprotect behavioral2/files/0x0008000000023446-13.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1608 PrstService.exe -
Loads dropped DLL 4 IoCs
pid Process 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 1608 PrstService.exe 1608 PrstService.exe 1608 PrstService.exe -
resource yara_rule behavioral2/files/0x0008000000023443-4.dat upx behavioral2/memory/1680-5-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/files/0x0007000000023447-15.dat upx behavioral2/files/0x0008000000023446-13.dat upx behavioral2/memory/1608-26-0x0000000000600000-0x0000000000624000-memory.dmp upx behavioral2/memory/1680-30-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral2/memory/1608-48-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\PrstService.dll PrstService.exe File created C:\Windows\SysWOW64\PrstService.exe 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PrstService.exe 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe File created C:\Windows\SysWOW64\PrstService.dll PrstService.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File opened for modification C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File created C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File created C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File created C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe File opened for modification C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\PrstService.jpg PrstService.exe File opened for modification C:\Windows\Fonts\PrstService.jpg PrstService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5B773864-3E41-11EF-A8A8-CEC55C810519} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "802165476" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "NO" PrstService.exe Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "802165476" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31117902" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31117902" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31117902" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "805759217" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427328564" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 1608 PrstService.exe 1608 PrstService.exe 1608 PrstService.exe 1608 PrstService.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 512 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 1608 PrstService.exe 512 IEXPLORE.EXE 512 IEXPLORE.EXE 3216 IEXPLORE.EXE 3216 IEXPLORE.EXE 3216 IEXPLORE.EXE 3216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1608 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 82 PID 1680 wrote to memory of 1608 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 82 PID 1680 wrote to memory of 1608 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 82 PID 1608 wrote to memory of 512 1608 PrstService.exe 84 PID 1608 wrote to memory of 512 1608 PrstService.exe 84 PID 512 wrote to memory of 3216 512 IEXPLORE.EXE 86 PID 512 wrote to memory of 3216 512 IEXPLORE.EXE 86 PID 512 wrote to memory of 3216 512 IEXPLORE.EXE 86 PID 1680 wrote to memory of 2664 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 88 PID 1680 wrote to memory of 2664 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 88 PID 1680 wrote to memory of 2664 1680 322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe 88 PID 1608 wrote to memory of 512 1608 PrstService.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\PrstService.exeC:\Windows\system32\PrstService.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:512 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3216
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\delus.bat2⤵PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
747KB
MD5322fb9825ef9cb13d6486654fe2b846f
SHA16b35c9af64204cd71f123d1efb38e4039d6dfe26
SHA25612dae350239569e85555f1fdd052d263526e8e5c67b12a1b6a65ee3c4d9af3d2
SHA512cc781799aff15986d0208d2a109615269b8dd1f051f3483179d9f97603b652642e1cc1329d168f9ddf4514271195f44850bb6545b484afe43e09c404cae81f4c
-
Filesize
230B
MD5881079fdf538000b6156d02a83cc2429
SHA1faa14b89ec39c3ee7789bf688481ff0321b024f8
SHA25653eb1fb8a38d3104769c827b2665d723c4450a21e639887170554e28c6e2a501
SHA512d3c7819a7608c997c0eeceb5ab8e32e074ea5ec16578d88966b58a9f6120a5fcbbcb0f2bc1a66dc9cba40e19f8ac66a60056b0813fcc4bc61850efb1d31609d3