Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe
-
Size
87KB
-
MD5
a6430c676166dd4db105f8bb82a55e8d
-
SHA1
c3851a59386b804964c27bfd768afb7f1adee005
-
SHA256
d80459b207a0c50f203ce7bc228ee19c186e10868fc2232d034e982fb9a84fe6
-
SHA512
16f26fdc2dca10e0fd163b644a3cc627e7f26ea0e0b1bafc82170319ecaf0d1d9436197469bc866954e53cb514d8c3e851c063c6c0a8396bbaf91ba285d48883
-
SSDEEP
1536:Ca+4evduxy+gtju8UOfbhaLNR9DVpz7PgEpGlWt/aHH3gadTAu+o:C7duU+gtjuAfbh8tDVKEpGgt/S3dd0Fo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe windcc32.rom,NcYRlamUtCp" a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\windcc32.rom a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\windcc32.rom a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4928 4116 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125841" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31125841" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3475364263" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{FABEB1AE-5D44-11EF-98CC-4E01FFCF908D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430738606" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3475364263" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3477864538" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31125841" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4340 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4340 iexplore.exe 4340 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4116 wrote to memory of 3444 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 89 PID 4116 wrote to memory of 3444 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 89 PID 4116 wrote to memory of 3444 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 89 PID 3444 wrote to memory of 4340 3444 cmd.exe 92 PID 3444 wrote to memory of 4340 3444 cmd.exe 92 PID 4340 wrote to memory of 2484 4340 iexplore.exe 94 PID 4340 wrote to memory of 2484 4340 iexplore.exe 94 PID 4340 wrote to memory of 2484 4340 iexplore.exe 94 PID 4116 wrote to memory of 4340 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 92 PID 4116 wrote to memory of 4340 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 92 PID 4116 wrote to memory of 3360 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 56 PID 4116 wrote to memory of 3360 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 56 PID 4116 wrote to memory of 2868 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 99 PID 4116 wrote to memory of 2868 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 99 PID 4116 wrote to memory of 2868 4116 a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6430c676166dd4db105f8bb82a55e8d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4340 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\OeJ8C61.bat"3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 5243⤵
- Program crash
PID:4928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4116 -ip 41161⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD55807ccf18a4daa262942fd318d06027d
SHA1dbc8a19819ea0e72bb69aea4e08b5c08b19cebe9
SHA25649127429f1b3e1e3126358abbce54b463587489939f48256edc3f4f54dc10890
SHA512204d2d8ff7d0b847b6263f9759441c88c32d39fca326de017c1c1e2bb33d64455adfcde5e96705f5408361a3a34baf002aaff12645413e5ec3bb13b2d7e980ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5562e08f13cf0cd35aa1eed1b15bceb59
SHA141729d2942643aa0179f158f3efc87e5b030912e
SHA2568132ac411f7e498095aa8379e29be8f4a16d50bb25dc22ef810a57e462ada711
SHA512a222594b60c59a4baffc897252c8583faa5aa5bf64ebeb0d8f0596e4c1f2c0a7d857cd977ce010b466b3d6860a83594c314ca417cf2971b6626310aa1f5f8989
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
188B
MD5b95973658d221eb62be6b980883b51df
SHA19231bdf4e7e78803f18f1aaba246754452772fcc
SHA25625899fefb6a289b002ef3c439037f0f99315436d166df372d61b2612677db167
SHA512138d5d90b3d7956aa6795e9890119333f761771b71c9134c4ff6b04fb4ba1f32d8d1fac94158f37468748758701a7114ac24e3b3a029cbae0db01ce4cd85931b
-
Filesize
62KB
MD55fd693f8057ff86c08ea8873ae61fa18
SHA1136c718e6438a5924087fdb232776948d112079f
SHA25611800cb53aee261852dda4fdf6b11fa9e6a2d5bf2df5c55c8e827d4c3c7e72c0
SHA512117511b05a62d3676ba32d03a1af346203701f5b0f8f6a6abd7eb02114173e673dc5230de4b9c5d4ca2b9f975174fe8c120c672ad12fe911e59f0e346f6f7839