Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 18:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe
-
Size
866KB
-
MD5
6457a0053035b50c7e60dd988b244163
-
SHA1
d9d2844f760667cb1c360b8d055b928b0b905ca9
-
SHA256
a95ca816a235985672c4a953f70e2e3ebaa794a8fbc0411333278460d41de9c3
-
SHA512
88677a193836a07402754ee7ac03dda9f3f93a39b0b76f9c8c89d6e736d1acbf1aeb12c751ee0c7429c71580dcb68ce4e3e5a80d0f08c5944b517ab2eb5cc2c0
-
SSDEEP
24576:GCrHGn1bYlkjv5hJ3MIAtDO6oRqBTmwC7rjHqJfM:nHGn1Lv57SK6oRaCXjKRM
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\IESettingSync 6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2308 6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2308 6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe 2308 6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6457a0053035b50c7e60dd988b244163_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2308