Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 05:34

General

  • Target

    406330f4abd0aff45ebc657b5b37560c_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    406330f4abd0aff45ebc657b5b37560c

  • SHA1

    7b38374a0bd219475158941d004dc055a44fd28c

  • SHA256

    44f53e2ca552f49ce5803a4139e09957c14422cfbc7e6ee5df445e16e4b2c4ce

  • SHA512

    36c7541442d8cd902a9e775b58b43cab90132f04a1067a9b5ae94ec7b11b9a1fef20bca709237a79bb22c460da90118605eae592dcb08d610d9b436d311193cc

  • SSDEEP

    1536:cj+x2UHc9nMXoML9atF9mV78oe1jDzeDCrqo/11s:bpaTQaw8ACr11s

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 50 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\406330f4abd0aff45ebc657b5b37560c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\406330f4abd0aff45ebc657b5b37560c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Program Files\52Z91.exe
      "C:\Program Files\52Z91.exe" C:\Users\Admin\AppData\Local\Temp\406330f4abd0aff45ebc657b5b37560c_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:2896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 216
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2132
    • C:\Program Files\52Z91.exe
      "C:\Program Files\52Z91.exe" rb
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2876
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files\0GOQJ3.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\sc.exe
        sc.exe create PRUW22BinPath= "C:\Program Files\8TAGERQJ5\YXLXC5JXA.exe -start" type= own type= interact start= auto DisplayName= 6KES2V70
        3⤵
        • Launches sc.exe
        PID:2668
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32.exe /u /s shimgvw.dll
        3⤵
          PID:2724
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /u /s itss.dll
          3⤵
            PID:1752
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s scrrun.dll
            3⤵
            • Modifies registry class
            PID:2220
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /u /s vbscript.dll
            3⤵
              PID:2832
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32.exe /s jscript.dll
              3⤵
              • Modifies registry class
              PID:2256
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Background_Sounds /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2308
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Play_Animations /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:1540
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Videos" /t REG_SZ /d no /F
              3⤵
              • Modifies Internet Explorer settings
              PID:2892
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Display Inline Images" /t REG_SZ /d yes /F
              3⤵
              • Modifies Internet Explorer settings
              PID:536
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v DisableScriptDebuggerIE /t REG_SZ /d yes /F
              3⤵
              • Modifies Internet Explorer settings
              PID:596
            • C:\Windows\SysWOW64\reg.exe
              reg.exe ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Disable Script Debugger" /t REG_SZ /d yes /F
              3⤵
              • Modifies Internet Explorer settings
              PID:264
            • C:\Windows\SysWOW64\reg.exe
              reg.exe delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /F
              3⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:780

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\0GOQJ3.bat

          Filesize

          1KB

          MD5

          aafb98e94186d0017562de89d12058d3

          SHA1

          857eee87b6d77c296e6a53d8b9eebc02e0ee2e1f

          SHA256

          32ec0cef57eaf6ed3f3f69186ac1c3a51602a5f5af1733b83cf356b0082985d5

          SHA512

          8cb30890094654f90983a50e9be714b6892b6bfc0fed35bc445b89c9317a8ad2145b39a2c066bb362dc4d206ea947307757cd23d5c4564af87490610f57c16d1

        • C:\Program Files\7-Zip\7zFM.exe.com

          Filesize

          68KB

          MD5

          406330f4abd0aff45ebc657b5b37560c

          SHA1

          7b38374a0bd219475158941d004dc055a44fd28c

          SHA256

          44f53e2ca552f49ce5803a4139e09957c14422cfbc7e6ee5df445e16e4b2c4ce

          SHA512

          36c7541442d8cd902a9e775b58b43cab90132f04a1067a9b5ae94ec7b11b9a1fef20bca709237a79bb22c460da90118605eae592dcb08d610d9b436d311193cc

        • \Program Files\52Z91.exe

          Filesize

          28KB

          MD5

          16b931eb346d9ddd833cf9fb6f6fe829

          SHA1

          564d9d92ada66930d759645ed60c331bf6a20216

          SHA256

          dd8ef34c2a7048f2970da5ec121c13c491eb86e0c149e1b57f65fd84e488de40

          SHA512

          040afe83fd90d79b44cb9c535e993610d2de034e4c807443f7d77e0fd1ec950e8326b93338c868c1ef4f357d6835aff82064470c7b687b03c8895f3cdac91ae1