Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe
-
Size
749KB
-
MD5
a78e31f8dd0f0bdfba3ac41a9aca0e74
-
SHA1
911d6b6935186af44c5b025f5c865d1868175ba0
-
SHA256
4de51b65f656de8832f10d888b9e00cf514623ebe047eca595a1afd94583fb13
-
SHA512
b2c6dd309f8b9ef2f1571bdb1e90e06c91047b505deb58d505b84ad146c541ff92604ab5bc454f7ec834398d402ae7e78377c634c8bd43f1ed5f7a3f15b1af86
-
SSDEEP
12288:7zGqvIontiXisXENKxAQkSknc9NLSCmlinPkyCrljtlESJk9v+LZJ8Ebm8qln:7zyontiXTVavSzLZJkyaZtySJk9v+Lw/
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winrnr.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SQLPARSE.DLL a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File created C:\Windows\SysWOW64\wshirda.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File created C:\Windows\SysWOW64\wpcmig.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpeffects.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wshirda.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File created C:\Windows\SysWOW64\winrnr.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File created C:\Windows\SysWOW64\sqlceqp30.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File created C:\Windows\SysWOW64\SQLPARSE.DLL a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\qasf.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File created C:\Windows\SysWOW64\qasf.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpeffects.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wpcmig.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sqlceqp30.dll a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2200 set thread context of 3512 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe -
Modifies registry class 48 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser\ = "vbSQLParser Object" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser\CLSID\ = "{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\VersionIndependentProgID a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\Version\ = "1.0" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\SQLPARSE.DLL" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\ProxyStubClsid32 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\TypeLib\ = "{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}\1.0\HELPDIR a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\TypeLib\ = "{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser.1\ = "vbSQLParser Object" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser.1\CLSID a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\VersionIndependentProgID\ = "SQLPARSE.vbSQLParser" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\TypeLib a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\ = "IVBSQLParser" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000} a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\InprocServer32\ = "C:\\Windows\\SysWow64\\SQLPARSE.DLL" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser.1 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\Version a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}\1.0\FLAGS a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\ = "IVBSQLParser" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\TypeLib\Version = "1.0" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser\CLSID a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser.1\CLSID\ = "{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\ProgID a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000} a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}\1.0 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\TypeLib a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\TypeLib\ = "{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser\CurVer a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}\1.0\ = "Microsoft SQL Parser Object Library 1.0" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\TypeLib\Version = "1.0" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\ProxyStubClsid32 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\TypeLib a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000} a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\ = "vbSQLParser Object" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\InprocServer32 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}\1.0\FLAGS\ = "0" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}\1.0\0\win32 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Media Type\{E436EB83-524F-11CE-9F53-0020AF0BA770}\{6B6D0801-9ADA-11D0-A520-00A0D10129C0} a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SQLPARSE.vbSQLParser\CurVer\ = "SQLPARSE.vbSQLParser.1" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6C7662-E8A1-11D0-B9B3-2A92D0000000}\ProgID\ = "SQLPARSE.vbSQLParser.1" a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}\1.0\0 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8F6C7660-E8A1-11D0-B9B3-2A92D0000000}\1.0\HELPDIR\ a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000} a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F6C7661-E8A1-11D0-B9B3-2A92D0000000} a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3512 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 3512 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 3512 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 3512 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2200 wrote to memory of 3512 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 86 PID 2200 wrote to memory of 3512 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 86 PID 2200 wrote to memory of 3512 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 86 PID 2200 wrote to memory of 3512 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 86 PID 2200 wrote to memory of 3512 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 86 PID 2200 wrote to memory of 3512 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 86 PID 2200 wrote to memory of 3512 2200 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 86 PID 3512 wrote to memory of 3552 3512 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 56 PID 3512 wrote to memory of 3552 3512 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 56 PID 3512 wrote to memory of 3552 3512 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 56 PID 3512 wrote to memory of 3552 3512 a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a78e31f8dd0f0bdfba3ac41a9aca0e74_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5c1894302379227a8d6627011f6be1d75
SHA13c15b0658a8a5b525745ccd687be6a38a3abd266
SHA256025723f897d36b4bf39010c805acb1161b46dbd243c3b965a71082e7ef9a0d56
SHA512e67823777c78f859fbafdb8a7d0e063889d8afe321b68c0c5b15cfb65e3258b6260a40e2f20ad7387d004bf32a731e1aec43d45ed0d75d1f1c47fa88cc43bd0f
-
Filesize
591KB
MD560236c8c3b8c2d8b9a59326890533eb8
SHA18839efae91f2c4e29fb4813981b6a93f1996beb5
SHA256badf0f5023ba9d7e5d7fea762e8f01ee2d8f41f7785fa6adb9d93af1f2181f8f
SHA512fe8666a83542c3834d9e8cc201f1efb02570d96d5a9194c1bd23c50d65b6e6d0a4d40b691c24cb3f99b2c5b8b3fb3c300ef83d5a255f6734e1aa65e23ad8435d
-
Filesize
15KB
MD508a05ecbf424c635a9fb2400b898ab17
SHA1c815bc830f0c1757da2a2e4cccfd6499d45daa6c
SHA256c3e9aa8a639343189c3b8499cf3de8950318ecce8054e49e1de10777c22b9e62
SHA512c615fabbd327408774b0a99bf0b668c3d6c849c3d2ce4b8bf41c0d79e8a0392de4140a42497eedc5b3e3316908fdb9914b979146c7c73a6489a3079dd1f73a86
-
Filesize
10KB
MD57fcb0f27fdf12e3d42b03a74bc3196bb
SHA19b9bf198c4cd6332d1ba98c71ba1bf817c027153
SHA256e4ae7894e962037ab85054ebfcfadc91d3d7b4d69d0f1ccba0fcf443aebd6cc7
SHA512729599a2ec25a4c9b64a683f6cb8f4645aee0280c34f313c4083322559ec5bb65f47cbfc7482988fd9073d100aeb361afed4cf70b7aba729ca69bcebbf7035cc