Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe
-
Size
792KB
-
MD5
fb9eb4462f8fe117dc159b8784f9e2a9
-
SHA1
62f54696563c2f474cd2a6225e3ab57facf5cb4f
-
SHA256
57f6400d0bc15b86ba457676acd549522e276aadbf1dc2e3b2b25d10f6c7ab64
-
SHA512
401d9c7c4c146520d35c2c2ae2df384faea80c388a6d48231c1826c9f92cfa27c16f03081efccfe986ecf4b17b2625343a1edbf9e6408d7ae9335c32381e4a5a
-
SSDEEP
12288:JjcxeMzYtcFERJmrbWeAynyfumsb26/f:lcxeMz/GJmWeAyncu1bV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe gphone.exe" fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\gphone.exe" fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\p: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\w: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\a: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\b: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\e: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\g: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\j: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\n: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\x: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\y: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\i: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\m: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\t: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\v: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\h: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\l: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\o: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\r: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\k: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\q: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\s: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\u: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened (read-only) \??\z: fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3124-0-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral2/files/0x00080000000235ad-10.dat autoit_exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\d:\autorun.inf fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File created \??\f:\autorun.inf fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened for modification F:\\autorun.inf fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\gphone.exe fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gphone.exe fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autorun.ini fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\gphone.exe fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe File opened for modification C:\Windows\gphone.exe fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://rnd009.googlepages.com/google.html" fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://rnd009.googlepages.com/google.html" fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://rnd009.googlepages.com/google.html" fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://rnd009.googlepages.com/google.html" fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://rnd009.googlepages.com/google.html" fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Token: 33 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Token: 33 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4192 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 89 PID 3124 wrote to memory of 4192 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 89 PID 3124 wrote to memory of 4192 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 89 PID 4192 wrote to memory of 4964 4192 cmd.exe 91 PID 4192 wrote to memory of 4964 4192 cmd.exe 91 PID 4192 wrote to memory of 4964 4192 cmd.exe 91 PID 3124 wrote to memory of 2604 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 92 PID 3124 wrote to memory of 2604 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 92 PID 3124 wrote to memory of 2604 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 92 PID 2604 wrote to memory of 3952 2604 cmd.exe 94 PID 2604 wrote to memory of 3952 2604 cmd.exe 94 PID 2604 wrote to memory of 3952 2604 cmd.exe 94 PID 3124 wrote to memory of 1744 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 95 PID 3124 wrote to memory of 1744 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 95 PID 3124 wrote to memory of 1744 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 95 PID 1744 wrote to memory of 3712 1744 cmd.exe 97 PID 1744 wrote to memory of 3712 1744 cmd.exe 97 PID 1744 wrote to memory of 3712 1744 cmd.exe 97 PID 3124 wrote to memory of 2060 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 98 PID 3124 wrote to memory of 2060 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 98 PID 3124 wrote to memory of 2060 3124 fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe 98 PID 2060 wrote to memory of 1036 2060 cmd.exe 100 PID 2060 wrote to memory of 1036 2060 cmd.exe 100 PID 2060 wrote to memory of 1036 2060 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb9eb4462f8fe117dc159b8784f9e2a9_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵
- System Location Discovery: System Language Discovery
PID:4964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\gphone.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\gphone.exe3⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cacls.execacls "C:\system volume information" /e /g "Admin":f3⤵
- System Location Discovery: System Language Discovery
PID:3712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cacls.execacls "C:\system volume information" /e /g "Admin":f3⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1316,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:81⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD50450bd6f856c038a41ab0e645b3b293b
SHA1ebbca685215823672fd692f6c3612f06dc30e084
SHA25611c6c38ee3e9cf9802cac107f4e4c24a070b0e43467842f401feee33b6967d5d
SHA512d1b0ed2662b274abd80e8d33775fcfaa30fe693707dc61ff2e0c2bd2f2ce50d2f3cac5d2a9f4f2fdf4232ebe72206fd47b86305d0c4d4d1bd147ba913e110fb8
-
Filesize
792KB
MD5fb9eb4462f8fe117dc159b8784f9e2a9
SHA162f54696563c2f474cd2a6225e3ab57facf5cb4f
SHA25657f6400d0bc15b86ba457676acd549522e276aadbf1dc2e3b2b25d10f6c7ab64
SHA512401d9c7c4c146520d35c2c2ae2df384faea80c388a6d48231c1826c9f92cfa27c16f03081efccfe986ecf4b17b2625343a1edbf9e6408d7ae9335c32381e4a5a