Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe
-
Size
188KB
-
MD5
326d685885fdef82aed76fb7ca1de91a
-
SHA1
ccfc2ac6fb5aadbf27ee5219086dec868f15bc14
-
SHA256
02530907805306c6942e2747293f7c05648387210babba4124f91d01e875ff08
-
SHA512
612831831e3f5d5b438f516e19d281fb16595fd16e5ef9049c7fa95710aefc86be62b80cf3a57946565046da91bacb8868afd6867d16f64e562868e7132675d1
-
SSDEEP
3072:AgXdZt9P6D3XJkK5+YWAy5KP4xASuXlUhiQcJE9BTdkj2h1GVDhyI1KUrV/5hkrt:Ae34R1WigmrXl2c25nMQUp/5hG6ZLE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1756 install.exe -
Executes dropped EXE 2 IoCs
pid Process 1756 install.exe 2088 Interactivy.exe -
Loads dropped DLL 3 IoCs
pid Process 2248 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe 1756 install.exe 1756 install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Interactivy = "C:\\Program Files (x86)\\Interactivy\\Interactivy.exe" install.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F10E89FF-CCBD-4505-AFFC-CD507013E496} install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F10E89FF-CCBD-4505-AFFC-CD507013E496}\ = "InteractivyH" install.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Interactivy\InteractivyH.dll 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Interactivy\Interactivy.ini install.exe File opened for modification C:\Program Files (x86)\Interactivy\Interactivy.ini Interactivy.exe File created C:\Program Files (x86)\Interactivy\install.exe 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe File created C:\Program Files (x86)\Interactivy\Interactivy.dll 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe File created C:\Program Files (x86)\Interactivy\uninstall.exe 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe File created C:\Program Files (x86)\Interactivy\Interactivy.exe 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe File created C:\Program Files (x86)\Interactivy\Update.exe 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8CA5935F-E525-4329-AF2C-169C6608E564}\ButtonText = "SmartSearch" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8CA5935F-E525-4329-AF2C-169C6608E564}\Default Visible = "Yes" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8CA5935F-E525-4329-AF2C-169C6608E564}\CLSID = "{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8CA5935F-E525-4329-AF2C-169C6608E564}\BandCLSID = "{8CA5935F-E525-4329-AF2C-169C6608E564}" install.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8CA5935F-E525-4329-AF2C-169C6608E564} install.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474}\ = "ISmartSearch" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474}\ProxyStubClsid32 install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearch.NewSmartSearch install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearch.NewSmartSearch\ = "NewSmartSearch Class" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03ECBF4C-E8DB-463D-B90E-240FA32CE028}\InprocServer32\ = "C:\\Program Files (x86)\\Interactivy\\Interactivy.dll" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399} install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearchBHO.SmartSearch.1 install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearchBHO.SmartSearch\CLSID\ = "{F10E89FF-CCBD-4505-AFFC-CD507013E496}" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F10E89FF-CCBD-4505-AFFC-CD507013E496}\InprocServer32\ = "C:\\Program Files (x86)\\Interactivy\\InteractivyH.dll" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}\1.0\ = "SmartSearchBHO 1.0 Type Library" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearch.NewSmartSearch.1\ = "NewSmartSearch Class" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03ECBF4C-E8DB-463D-B90E-240FA32CE028}\Programmable install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742}\TypeLib\Version = "1.0" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearchBHO.SmartSearch\CurVer\ = "SmartSearchBHO.SmartSearch.1" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F10E89FF-CCBD-4505-AFFC-CD507013E496} install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F10E89FF-CCBD-4505-AFFC-CD507013E496}\TypeLib\ = "{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474} install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearch.NewSmartSearch\CLSID\ = "{03ECBF4C-E8DB-463D-B90E-240FA32CE028}" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F10E89FF-CCBD-4505-AFFC-CD507013E496}\VersionIndependentProgID\ = "SmartSearchBHO.SmartSearch" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}\1.0\0\win32\ = "C:\\Program Files (x86)\\Interactivy\\InteractivyH.dll" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474} install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474}\ = "ISmartSearch" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742} install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F10E89FF-CCBD-4505-AFFC-CD507013E496}\ProgID\ = "SmartSearchBHO.SmartSearch.1" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}\1.0\HELPDIR install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742}\ProxyStubClsid32 install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearchBHO.SmartSearch\CLSID install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474}\TypeLib\ = "{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03ECBF4C-E8DB-463D-B90E-240FA32CE028}\ProgID install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03ECBF4C-E8DB-463D-B90E-240FA32CE028}\VersionIndependentProgID install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742}\TypeLib install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742}\TypeLib\Version = "1.0" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearchBHO.SmartSearch install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474}\TypeLib\ = "{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03ECBF4C-E8DB-463D-B90E-240FA32CE028} install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03ECBF4C-E8DB-463D-B90E-240FA32CE028}\VersionIndependentProgID\ = "SmartSearch.NewSmartSearch" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03ECBF4C-E8DB-463D-B90E-240FA32CE028}\TypeLib install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03ECBF4C-E8DB-463D-B90E-240FA32CE028}\TypeLib\ = "{DC4BBFCC-8943-459F-A3D8-CCD8A93FAE5A}" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}\1.0 install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}\1.0\0 install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742}\TypeLib install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearchBHO.SmartSearch\CurVer install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearch.NewSmartSearch.1\CLSID\ = "{03ECBF4C-E8DB-463D-B90E-240FA32CE028}" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearch.NewSmartSearch\CLSID install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F10E89FF-CCBD-4505-AFFC-CD507013E496}\InprocServer32\ThreadingModel = "Apartment" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}\1.0\FLAGS install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}\1.0\0\win32 install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742}\TypeLib\ = "{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearchBHO.SmartSearch\ = "SmartSearch Class" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F10E89FF-CCBD-4505-AFFC-CD507013E496}\TypeLib install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474}\TypeLib\Version = "1.0" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearch.NewSmartSearch.1 install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03ECBF4C-E8DB-463D-B90E-240FA32CE028}\InprocServer32\ThreadingModel = "Apartment" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}\1.0\ = "SmartSearch 1.0 Type Library" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{43E3F6F3-6201-4C88-8ECF-E08C49A9B399}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Interactivy" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SmartSearchBHO.SmartSearch.1\CLSID install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F10E89FF-CCBD-4505-AFFC-CD507013E496}\ = "SmartSearch Class" install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C47D8D45-78DB-4CEC-992B-C207E289E474}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8CA5935F-E525-4329-AF2C-169C6608E564}\Implemented Categories install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8CA5935F-E525-4329-AF2C-169C6608E564}\Implemented Categories\{00021494-0000-0000-C000-000000000046} install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B7F9C704-AF25-4973-BB4A-2F6E485F9742} install.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1756 install.exe 1756 install.exe 1756 install.exe 1756 install.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1756 install.exe 1756 install.exe 2088 Interactivy.exe 2088 Interactivy.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1756 2248 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe 81 PID 2248 wrote to memory of 1756 2248 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe 81 PID 2248 wrote to memory of 1756 2248 326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe 81 PID 1756 wrote to memory of 2088 1756 install.exe 84 PID 1756 wrote to memory of 2088 1756 install.exe 84 PID 1756 wrote to memory of 2088 1756 install.exe 84 PID 1756 wrote to memory of 4372 1756 install.exe 85 PID 1756 wrote to memory of 4372 1756 install.exe 85 PID 1756 wrote to memory of 4372 1756 install.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Interactivy\install.exe"C:\Program Files (x86)\Interactivy\install.exe" Y;C:\Users\Admin\AppData\Local\Temp\326d685885fdef82aed76fb7ca1de91a_JaffaCakes118.exe;203416872⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Interactivy\Interactivy.exe"C:\Program Files (x86)\Interactivy\Interactivy.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c \weersdins.bat3⤵PID:4372
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5b99bbb500e7e2edc693b323801b7c5db
SHA17747d327e4108ca84996e499df1aaa8de0bc3cd0
SHA2566f86f6ac2e57bbd73c028fc0b20a2822e0c45c734c7191bb4e746a0034994580
SHA512cf9c5700c292e5c114b29385b7d56e6c01ad13f962cb4ce860d085529bd5a1955b79585120986abd0f8c137140fb36783b397286d2763291bb705619bd355ac2
-
Filesize
47KB
MD51894d7120de283e8c53dede80618e8b3
SHA1989cf8fc47daa325cc2b475542c012ba3134c669
SHA2561ff3c1dce91011480253b4bb89f53464ed57cfcb44fd2935be6947fc48688c93
SHA51253e47c3aa34779ec25efd7ad2cb87797752ed9b9f44d68147dff124d82e00660bf1bcd2bdde602cccb63b723f7e0db0cd732fd916046c4687ea37bd77473884d
-
Filesize
79KB
MD5279e74787cc19f429cf030d6aca7396c
SHA1dfb8f9ae3d62a1534c09008f5f918a2150f29c1d
SHA256d510e6c35b68eead339b82fc74b27719b63594a4469a6924e9bd4022054f9abc
SHA5122515ea8f586efbde955b2932af2fdff517b92c5b79a6e55c76084f080220b1eea5686dcad6a44c6627e8c456fffc3cd6fc7565c688ccebaffcece0a7f797cbe6
-
Filesize
47KB
MD523e2f689669b10cf4031040d2bbe2dd7
SHA11a0477aea4b8c631e7989b60108c1d48e7cc448f
SHA2566a7318f019a9cb7f86da32883425f39289f72818fd349cd4bd0a363e6459a8f7
SHA512fbcd845bbac7c152b3031fa9cde9b952e151e7618aa21e0b66161058fb1ed382a9fb6b67db50cf9d62d6f2d1d87be8ca0a1d2176ca11d40129ab5f44a91e2b48
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
156B
MD57597e9f2148a809abe2863bf6b934774
SHA12ba20753e4d1b19ee19e937c253074386807c51e
SHA25685c0ffb21ed018df813e67b7c02e6ebcaf21bec3d91c0c9445095b883fe22641
SHA5122a3600f2f6ce9e7e2ca081abcfbc0c1a7917e6f369eacc3b29fe993bcfebe980d6cf4a81317ea86d58dc0c7660ba896824c7be03f6ca214effc011e43160126d