Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe
-
Size
349KB
-
MD5
82a40fa636812a69cbcea3079f59ac45
-
SHA1
3c3277a7eda4857ae4f7155a10cfd2fef4a6107b
-
SHA256
a4390c8aa7f4515e739417385626e9af0d7d8d2bbe201669d7a27dbb81909f04
-
SHA512
0fd4efb8c3e77c8e43342e8f37217407324f7212a382f0879d9fc47f3b1e68a51c6f7e6fbfc02a1314b3db5f2acd97857bea609f1e70780df863402deaabe3b8
-
SSDEEP
6144:ye34WpzWCHKMayfL44okkdq96CQpiGF+p5QKC0vb+FO:YkL44oqspidDvb+FO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Control Panel\International\Geo\Nation cscript.exe -
Executes dropped EXE 1 IoCs
pid Process 4804 installstat.exe -
Loads dropped DLL 4 IoCs
pid Process 2264 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe 2264 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe 2264 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe 4804 installstat.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\EditPlus\kk59.icw 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installstat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000af07eb2c087fb546ad96fc896f0a0bc6000000000200000000001066000000010000200000003494b0b9efaeaa43a6471ecd964120baa77d422d4395c59129ee4e3bc6596c29000000000e80000000020000200000002924bbc380e4021252dcf06e330ac9a0ad1f3454b247b8b1df62531c6bbe49b420000000443d5e5fb7b03d75f08dac450ad2b2640bfdd7e7efd2284c4d8751fcd32253a240000000b71c814bfb26578949f068da6658aae6c2e13118504026a369ddc78665d562129c59db8231d2866d71a13a5ecd35642c54c1128aa14210850feea668d6efa0f1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a24e2781e4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31122561" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "645715471" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90cd0b2781e4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "643371611" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "643371611" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000af07eb2c087fb546ad96fc896f0a0bc6000000000200000000001066000000010000200000008f6aa77fd5e606bf39676efb0ac45aa40cddcc6c76380a2e24ed88b01c3e1c95000000000e8000000002000020000000456054f0aa1723353958d70a16b39200e087e3e81fb2b72ffc4732293a6d4e712000000032192fdb32c81d42009eeec42c0bebfa3335b28ff7789a740e0ad54e54a3c0e04000000063167a85cbeb2dc100be126a4407cf194ebd3ee3999df67d26c1b19f7ba9e13033a44408d98c46862ee8ed895fcb7f213f57f61bd1bc2f04b92da4c576c96fa1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429329574" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31122561" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{51FB73B7-5074-11EF-B6E5-F2ABACF817F1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31122561" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine\ = "VBScript" 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000_Classes\Local Settings cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.icw 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.icw\ = "icwfile" 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\ = "´ò¿ª(&O)" 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5064 iexplore.exe 5064 iexplore.exe 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE 1512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2264 wrote to memory of 4488 2264 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe 84 PID 2264 wrote to memory of 4488 2264 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe 84 PID 2264 wrote to memory of 4488 2264 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe 84 PID 4488 wrote to memory of 3008 4488 cscript.exe 88 PID 4488 wrote to memory of 3008 4488 cscript.exe 88 PID 4488 wrote to memory of 3008 4488 cscript.exe 88 PID 2264 wrote to memory of 4804 2264 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe 89 PID 2264 wrote to memory of 4804 2264 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe 89 PID 2264 wrote to memory of 4804 2264 82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe 89 PID 5064 wrote to memory of 1512 5064 iexplore.exe 92 PID 5064 wrote to memory of 1512 5064 iexplore.exe 92 PID 5064 wrote to memory of 1512 5064 iexplore.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82a40fa636812a69cbcea3079f59ac45_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Program Files (x86)\EditPlus\kk59.icw"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk59.icw"3⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:3312
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5064 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD577bc157e3a50b8fcb1aa8b3d20693f9e
SHA156d0b27225ab2842ff7e2f8fffff30b989c112e0
SHA2563f857740fd56a1b116d1de4348b1c23a8737a8a7694918dbf9408d93340a06e6
SHA512a81c2fd0d3e17ec658a807485bcaf06888d268e17e09c1c71bff48b3bf964ccd2adbd3a5bf25d4153f91c2185e1dc1a212848b648700a49f0b880bc2532dbbcc
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
845B
MD5e3f630212e07f0455e8555a6e2f1cc2a
SHA16814c4a0e8153fa54326663dc64b948e450b406f
SHA256610b20b2ba4bf7a7158592cabc09189dad35eaf7a3dabb2c9c66b69cfda60eb0
SHA512c7566fc7f04015fa2d1e6be1cca0e33c864fb83837f24f40c8804fffb0002c5bcd006e97f84cc97f499512e3bea0e9285719e22d136a56fb0d5bf78ff0456210
-
Filesize
80KB
MD567cf306d9bdb258d3cc5b3244cb54550
SHA18146becfa2fceb897216720e8fa59960b69ebae3
SHA256a8526ac60d3c0d33c503c3d262752182864d1dbbd376ecc0ea60987dae869fa5
SHA51274b1dcc812a2cd291a9429228929d2dba26a053315add45415da579c3ae7e7566a943930de42e81ff5d2a4c36de930cf9c5cb26ea92576c504a0621de633acfd