Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 05:33
Behavioral task
behavioral1
Sample
2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
2f25cbad07c3fe02e572a21514bb25ce
-
SHA1
e7fd2180e6a7da20b5ee9b0c5071f0e82d241bf6
-
SHA256
8063ca1dc808a1cee7c276d7ac4c883a5b13387f9ddeeceea5edf930575fe007
-
SHA512
d4250de5c6793205af299a890632f8f471f3cb2ed9894fa42442339b24eec2e1a0fd867a632217d59f14593226d51e003ff931e58f9068b188a1ae1950e3a99b
-
SSDEEP
24576:WmYnXv5aoGJ5ZbXfn8Qg4O5ZMxp3JESywkjBDlj9vEqq1:8XvURZb/1jp3PywkFlj9vi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2836 Restorator 2006.exe 1900 Restorator.exe -
Loads dropped DLL 4 IoCs
pid Process 2636 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe 2636 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe 2548 cmd.exe 2548 cmd.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe -
resource yara_rule behavioral1/memory/2636-0-0x0000000000400000-0x000000000053F000-memory.dmp upx behavioral1/memory/2636-34-0x0000000000400000-0x000000000053F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tlb\shellex Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{762F86D0-B3EA-11d2-84D3-0080AD160D07}\InProcServer32\ = "RestoratorContextMenu.dll" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.ax\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ax Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.bpl\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.cnv\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shellex\ContextMenuHandlers Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.flt\ = "BomeRst.flt" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.flt\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tsp Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.acm\ = "BomeRst.acm" Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wpc\ = "BomeRst.wpc" Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dpl\ = "BomeRst.dpl" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\drvfile Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tlb Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.wpc\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dcr Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.cnv\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tlb\shellex\ContextMenuHandlers Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ax\ = "BomeRst.ax" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.rc\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.bpl Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.acm Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\dllfile Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shellex Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bpl\ = "BomeRst.bpl" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.ax\shellex Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cnv\ = "BomeRst.cnv" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.dcr Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.rc\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.ax Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rc Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sys Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tlb Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tsp\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile\shellex Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.dcr\ = "BomeRst.dcr" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.flt Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.flt Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocxfile Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.res\shellex Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tsp\ = "BomeRst.tsp" Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.acm\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.dpl Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.rc\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.res\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sysfile\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.bpl\shellex Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.flt\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shellex\ContextMenuHandlers Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BomeRst.tlb\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\cplfile\shellex\ContextMenuHandlers\{762F86D0-B3EA-11d2-84D3-0080AD160D07} Restorator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rc\ = "BomeRst.rc" Restorator.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2696 regedit.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1900 Restorator.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2836 2636 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2836 2636 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2836 2636 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe 30 PID 2636 wrote to memory of 2836 2636 2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe 30 PID 2836 wrote to memory of 2548 2836 Restorator 2006.exe 31 PID 2836 wrote to memory of 2548 2836 Restorator 2006.exe 31 PID 2836 wrote to memory of 2548 2836 Restorator 2006.exe 31 PID 2836 wrote to memory of 2548 2836 Restorator 2006.exe 31 PID 2548 wrote to memory of 2696 2548 cmd.exe 33 PID 2548 wrote to memory of 2696 2548 cmd.exe 33 PID 2548 wrote to memory of 2696 2548 cmd.exe 33 PID 2548 wrote to memory of 2696 2548 cmd.exe 33 PID 2548 wrote to memory of 1900 2548 cmd.exe 34 PID 2548 wrote to memory of 1900 2548 cmd.exe 34 PID 2548 wrote to memory of 1900 2548 cmd.exe 34 PID 2548 wrote to memory of 1900 2548 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2f25cbad07c3fe02e572a21514bb25ce_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Restorator 2006.exe"C:\Users\Admin\AppData\Local\Temp\Restorator 2006.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt5238.bat "C:\Users\Admin\AppData\Local\Temp\Restorator 2006.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\regedit.exeregedit /s setup.reg4⤵
- Runs .reg file with regedit
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\Restorator.exeRestorator.exe4⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1900
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD59708121c091ac1c06f677c5531836fac
SHA1aa0099b4fe219981917d63314723246b5fb51505
SHA2562f448f1a0303d94e87c5f4c87764b3cc909fff3e06b0c39b8a4f69e1f8baffd9
SHA512ed38c9aa05f534105eb45e9348d113b10d54af26d71a2655ef3ad69def29c076b3b2b536147f52a29246fcd1a0c7757f4f0263e9aacb180344485b532a9b90fc
-
Filesize
147KB
MD5ff7eb09ee68bb57bcf4e562d2b4e7ee0
SHA1f9349040d7672beaf9fb097a016f2fe692cf3b36
SHA25686f5c07780ea7352c21e62df310dfb9bfee0b0fbf49c7c57ba49f02610df50eb
SHA512ed6b87d373ecc90efe36456c45e82b60ce2b53a0b8f51fbdd404f5ca2770e7df2e55fbc245ef6f16a161e6d26ed88f0ead121b27ca436663565c28188c4dd66c
-
Filesize
80B
MD5e90d06192a965ec1ecb1cb48f74ded3e
SHA15c697156894d71e84bd79bf67afcf57971f1e7d2
SHA2567231872a6028bbeca738c5158219b2100fb24871278598c51b15f81e9f8ba3ac
SHA5126a73f677607653ceb893e55129f31125eb5f28c40e9c16dfc4dee8777009837ef1886594c8a86bc8ec837bb4bac0f3ae03996f38bc4d14f0966639f6ecf4dff7
-
Filesize
656B
MD586e88695bd1e76522761c853fe4ada0a
SHA172ffb5f6ac99de7fe0820d95b01e4f33bab09d82
SHA25689f2897c27615606f4e7fe75297c75c118b04c6445eef461ea162742e93cf0fa
SHA512c52f0726ea29d2d1b0b541320ef78ab50822213832ab4ce3557d9327f69d13a833b49098ca71fc5e96ef3888391bc234e096381f343fb462c636759f184b1b8c
-
Filesize
2.1MB
MD5ece34ddce9bb177476de69bcd6dee912
SHA175af55a55a6f79bed39ca8ece4426224faeebfc3
SHA256c397cac86f72529ac747c72024800f44a1f605b10e7f96468e1aa909beb5153b
SHA512f16fac4c7b93e3a7d5f3742f78e13477cb6c5c8fbace369a9435b1ea037ba726cf69d93a9456719abade3e7e94366031c958768a0190747c10c8c8b9dbc70bff