Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe
-
Size
570KB
-
MD5
b505c838d1ff40fd639e762f4594075c
-
SHA1
ddc06b4a856bffdfb686812012080451d2e14dbc
-
SHA256
a7ad629c0d5323a126e66d26e41d9f516467d208c0ca71be3d3db94a5b5af081
-
SHA512
8f50b3e8452ecefcfb7a0335942686d86481d5adab3ea806bde158c3fda84891ab5fb843fc43f731c96ea074c3027f902c9da540a573816d1c5459388288d257
-
SSDEEP
12288:zANwRo+mv8QD4+0V16/5UfeNB6efhgBdStUgkPM94MR:zAT8QE+kX420XR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4216 holyshit.exe -
Loads dropped DLL 2 IoCs
pid Process 5056 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe 4216 holyshit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Winloge = "C:\\Users\\Admin\\AppData\\Roaming\\holyshit.exe" holyshit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language holyshit.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8} b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebPRoject.Neutralize b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}\8.0 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}\8.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Roaming\\WebProject.ocx" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\TypeLib b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\ProxyStubClsid32 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}\8.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Roaming" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA} b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\TypeLib b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WebPRoject.Neutralize\Clsid b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792} b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\TypeLib\ = "{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\VERSION b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\TypeLib\ = "{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\ = "__Neutralize" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\ToolboxBitmap32\ = "C:\\Users\\Admin\\AppData\\Roaming\\WebProject.ocx, 30000" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\MiscStatus\1 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}\8.0\HELPDIR b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\ = "_Neutralize" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA} b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\ = "WebPRoject.Neutralize" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}\8.0\FLAGS\ = "2" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}\8.0\0\win32 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\MiscStatus\ = "0" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\TypeLib b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebPRoject.Neutralize\ = "WebPRoject.Neutralize" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\Implemented Categories b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792} b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\ProxyStubClsid32 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\TypeLib\Version = "8.0" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\TypeLib\ = "{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\ToolboxBitmap32 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WebPRoject.Neutralize\Clsid\ = "{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6234C2B1-54E6-4F4F-96A8-40EE1DB40867} b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}\8.0\ = "WebPRoject" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}\8.0\FLAGS b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\ProxyStubClsid32 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\VERSION\ = "8.0" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\TypeLib b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\TypeLib b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\WebProject.ocx" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\Control b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\InprocServer32\ThreadingModel = "Apartment" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\ = "Neutralize" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\ = "Neutralize" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\TypeLib\ = "{6234C2B1-54E6-4F4F-96A8-40EE1DB40867}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\ = "__Neutralize" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\InprocServer32 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\ProxyStubClsid b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\TypeLib\Version = "8.0" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\ProgID\ = "WebPRoject.Neutralize" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\ = "_Neutralize" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D1D1BE37-54DE-4B41-B3DC-7A9C873B2792}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\ProxyStubClsid b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4DA0049-4863-40D8-A1A4-801F8409D8CA}\TypeLib\Version = "8.0" b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EFAB8ABE-7619-4F41-885B-A0978E17AFC8}\MiscStatus b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4216 holyshit.exe 4216 holyshit.exe 4216 holyshit.exe 4216 holyshit.exe 4216 holyshit.exe 4216 holyshit.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4216 holyshit.exe 4216 holyshit.exe 4216 holyshit.exe 4216 holyshit.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4216 5056 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe 87 PID 5056 wrote to memory of 4216 5056 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe 87 PID 5056 wrote to memory of 4216 5056 b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Roaming\holyshit.exeC:\Users\Admin\AppData\Roaming\holyshit.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5686f8494e71de081c5bb8c6888fceb0d
SHA107ee5026a08f952d12d1bcad6f6a319c6b0a6f5d
SHA2562c5925e725c873b2988456d083555028d4aa91132b85d55cbe3c13821f736fe0
SHA512ca3ce4b514f69d15b50a9346561124c674951d7ed87da3e2f2166dea3d5b9bb721cdae6fb3c5f0d904f7a5d8520e1563adfcbc7d2913f21c232c767016ad695b
-
Filesize
20KB
MD5bcf781e1e9dacfafc428dfd74b6d2607
SHA134e05431184e0bfa38bc146593183297831924a2
SHA256e236ffb6e458cb169ad4473d759b2247debb2cfa65fe379e309de734a1d5f2f7
SHA5129c5c1cd141b4c871a5f21ed0340a08a40ee00765d932a95019cf4ccbc905cc6305d3fae46f89960b199887e68c4ca05f56e5ee215884af66bf33a99fcf4a87ae