Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 20:17 UTC
Static task
static1
Behavioral task
behavioral1
Sample
0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
0745b720c0330c64f6047024027b0fe7
-
SHA1
b10bed81a1245e84f34378307d24e0c38f28ee06
-
SHA256
742d365f0f9001602ee3c0734bcef4a44cde92fd29a69d48247b1ac60a30e726
-
SHA512
742e5831bbd41aa8ad0e8161cbdc41d8d4d994c01ff9358933d0f93f4f7fdbcedc24a779f4a5ced499bdc138e0f3b37edbc835fcd976bdfe06d17457a8b891de
-
SSDEEP
24576:foYx5sXo6cgL8/b2FAiU4DhEr/cJzz00F5JAn/KJd3AouffPD/gEOao3bzMUXuGH:forXVg/bU9URUZQuoivYPD/71orzMiNH
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2900 regsvr32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{21608B66-026F-4DCB-9244-0DACA328DCED} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{21608B66-026F-4DCB-9244-0DACA328DCED}\ = "PlaySushi" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{21608B66-026F-4DCB-9244-0DACA328DCED}\NoExplorer = "1" regsvr32.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\PlaySushi\PSText.dll 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe File created C:\Program Files (x86)\PlaySushi\psuninst.exe 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe File created C:\Program Files (x86)\PlaySushi\icon.ico 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe File created C:\Program Files (x86)\PlaySushi\psff.tmp 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{E89A07B5-BD7A-43F9-BDA4-0DAA48AC4FA5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\PSText.DLL\AppID = "{E89A07B5-BD7A-43F9-BDA4-0DAA48AC4FA5}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PlaySushi32.PlaySushi.1\ = "PlaySushi" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21608B66-026F-4DCB-9244-0DACA328DCED} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21608B66-026F-4DCB-9244-0DACA328DCED}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{975BBCC0-19DF-47C2-9AE2-D78EEFA96821} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{975BBCC0-19DF-47C2-9AE2-D78EEFA96821}\1.0\ = "PlaySushi32 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{975BBCC0-19DF-47C2-9AE2-D78EEFA96821}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\PlaySushi" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5272CCD4-4199-4B04-BF68-B28A0DCF0151}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\PSText.DLL regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PSText.IEButton\ = "IEButton Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB}\TypeLib\ = "{975BBCC0-19DF-47C2-9AE2-D78EEFA96821}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PlaySushi32.PlaySushi\ = "PlaySushi" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F165085B-6B85-4AD5-AD00-95552A823F6D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5272CCD4-4199-4B04-BF68-B28A0DCF0151} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5272CCD4-4199-4B04-BF68-B28A0DCF0151}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1}\TypeLib\ = "{975BBCC0-19DF-47C2-9AE2-D78EEFA96821}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1}\ = "IIEButton" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PSText.IEButton.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PSText.IEButton\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F165085B-6B85-4AD5-AD00-95552A823F6D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F165085B-6B85-4AD5-AD00-95552A823F6D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{E89A07B5-BD7A-43F9-BDA4-0DAA48AC4FA5}\ = "PlaySushi32" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PSText.IEButton.1\CLSID\ = "{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F165085B-6B85-4AD5-AD00-95552A823F6D}\ = "_IPluginEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PSText.IEButton\CurVer\ = "PSText.IEButton.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PlaySushi32.PlaySushi.1\CLSID\ = "{21608B66-026F-4DCB-9244-0DACA328DCED}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PlaySushi32.PlaySushi\CLSID\ = "{21608B66-026F-4DCB-9244-0DACA328DCED}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21608B66-026F-4DCB-9244-0DACA328DCED}\ = "PlaySushi" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{975BBCC0-19DF-47C2-9AE2-D78EEFA96821}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{975BBCC0-19DF-47C2-9AE2-D78EEFA96821}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F165085B-6B85-4AD5-AD00-95552A823F6D}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21608B66-026F-4DCB-9244-0DACA328DCED}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5272CCD4-4199-4B04-BF68-B28A0DCF0151}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5272CCD4-4199-4B04-BF68-B28A0DCF0151}\ = "IPlugin" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PlaySushi32.PlaySushi\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21608B66-026F-4DCB-9244-0DACA328DCED}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{975BBCC0-19DF-47C2-9AE2-D78EEFA96821}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5272CCD4-4199-4B04-BF68-B28A0DCF0151}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB}\ProgID\ = "PSText.IEButton.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PlaySushi32.PlaySushi\CurVer\ = "PlaySushi32.PlaySushi.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F165085B-6B85-4AD5-AD00-95552A823F6D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F165085B-6B85-4AD5-AD00-95552A823F6D}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F165085B-6B85-4AD5-AD00-95552A823F6D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{975BBCC0-19DF-47C2-9AE2-D78EEFA96821}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5272CCD4-4199-4B04-BF68-B28A0DCF0151}\ = "IPlugin" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PSText.IEButton\CLSID\ = "{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PlaySushi32.PlaySushi.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PlaySushi32.PlaySushi regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{5272CCD4-4199-4B04-BF68-B28A0DCF0151}\TypeLib\ = "{975BBCC0-19DF-47C2-9AE2-D78EEFA96821}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PSText.IEButton.1\ = "IEButton Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBD24BD3-E272-4FA3-A8BA-C5D709757CAB}\ = "GoClient" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Token: SeDebugPrivilege 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Token: SeDebugPrivilege 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Token: SeDebugPrivilege 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Token: SeDebugPrivilege 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Token: SeDebugPrivilege 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe Token: SeDebugPrivilege 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2756 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2756 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2756 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 30 PID 2236 wrote to memory of 2756 2236 0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe 30 PID 2756 wrote to memory of 2900 2756 cmd.exe 32 PID 2756 wrote to memory of 2900 2756 cmd.exe 32 PID 2756 wrote to memory of 2900 2756 cmd.exe 32 PID 2756 wrote to memory of 2900 2756 cmd.exe 32 PID 2756 wrote to memory of 2900 2756 cmd.exe 32 PID 2756 wrote to memory of 2900 2756 cmd.exe 32 PID 2756 wrote to memory of 2900 2756 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32.exe /s "C:\Program Files (x86)\PlaySushi\PSText.dll"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\PlaySushi\PSText.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2900
-
-
Network
-
Remote address:8.8.8.8:53Requestwww.playsushi.comIN AResponsewww.playsushi.comIN CNAMEtraff-3.hugedomains.comtraff-3.hugedomains.comIN CNAMEhdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.comhdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.comIN A3.19.116.195hdr-nlb4-0bbd2e21834cb637.elb.us-east-2.amazonaws.comIN A3.18.7.81
-
GEThttp://www.playsushi.com/aj/inst.php?p=tLT%2Fyu7CwdO1u7G6sLGyyPD65vXgt7b%2FssG0x7e7xbTGu7a2tLfAwv%2Bj%2F7Ozs7Kzs7Oz%2F8zI%2F8zI0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exeRemote address:3.19.116.195:80RequestGET /aj/inst.php?p=tLT%2Fyu7CwdO1u7G6sLGyyPD65vXgt7b%2FssG0x7e7xbTGu7a2tLfAwv%2Bj%2F7Ozs7Kzs7Oz%2F8zI%2F8zI HTTP/1.1
User-Agent: psi v2.0.366
Host: www.playsushi.com
Cache-Control: no-cache
ResponseHTTP/1.1 302 Found
date: Tue, 01 Oct 2024 20:17:59 GMT
location: https://www.hugedomains.com/domain_profile.cfm?d=playsushi.com
-
Remote address:8.8.8.8:53Requestwww.hugedomains.comIN AResponsewww.hugedomains.comIN A172.67.70.191www.hugedomains.comIN A104.26.6.37www.hugedomains.comIN A104.26.7.37
-
GEThttps://www.hugedomains.com/domain_profile.cfm?d=playsushi.com0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exeRemote address:172.67.70.191:443RequestGET /domain_profile.cfm?d=playsushi.com HTTP/1.1
User-Agent: psi v2.0.366
Connection: Keep-Alive
Cache-Control: no-cache
Host: www.hugedomains.com
ResponseHTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
cache-control: private
vary: Accept-Encoding
set-cookie: site_version_phase=108; expires=Fri, 26-Sep-2025 20:18:00 GMT; path=/
set-cookie: site_version=HDv3; expires=Fri, 26-Sep-2025 20:18:00 GMT; path=/
x-powered-by: ASP.NET
lb: TclPrdLbHd3
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=COAqe1fnY5O2y1%2Fyp6qcPwmOSzZVnrJV5yNxAgt2EFIK9ZYUrbW9uROH%2BNNF8v0jnySBaecQZ27fOO2wx%2FHh0JwQkPH2NnPwXMWbUJDXcI%2F8oKt%2BX%2BJF%2B0GyjZcOg1W6tXB%2BqAY%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8cbf23b13e5a94d9-LHR
-
Remote address:8.8.8.8:53Requestc.pki.googIN AResponsec.pki.googIN CNAMEpki-goog.l.google.compki-goog.l.google.comIN A142.250.179.227
-
Remote address:142.250.179.227:80RequestGET /r/gsr1.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: c.pki.goog
ResponseHTTP/1.1 200 OK
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
Content-Length: 1739
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 0
Date: Tue, 01 Oct 2024 19:45:21 GMT
Expires: Tue, 01 Oct 2024 20:35:21 GMT
Cache-Control: public, max-age=3000
Age: 1959
Last-Modified: Mon, 08 Jul 2024 07:38:00 GMT
Content-Type: application/pkix-crl
Vary: Accept-Encoding
-
Remote address:142.250.179.227:80RequestGET /r/r4.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/6.1
Host: c.pki.goog
ResponseHTTP/1.1 200 OK
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
Content-Length: 436
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 0
Date: Tue, 01 Oct 2024 19:30:15 GMT
Expires: Tue, 01 Oct 2024 20:20:15 GMT
Cache-Control: public, max-age=3000
Age: 2865
Last-Modified: Thu, 25 Jul 2024 14:48:00 GMT
Content-Type: application/pkix-crl
Vary: Accept-Encoding
-
Remote address:8.8.8.8:53Requestcrl.microsoft.comIN AResponsecrl.microsoft.comIN CNAMEcrl.www.ms.akadns.netcrl.www.ms.akadns.netIN CNAMEa1363.dscg.akamai.neta1363.dscg.akamai.netIN A2.19.117.10a1363.dscg.akamai.netIN A2.19.117.18
-
Remote address:2.19.117.10:80RequestGET /pki/crl/products/MicRooCerAut2011_2011_03_22.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Wed, 01 May 2024 09:28:59 GMT
User-Agent: Microsoft-CryptoAPI/6.1
Host: crl.microsoft.com
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-MD5: 8M9bF5Tsp81z+cAg2quO8g==
Last-Modified: Thu, 26 Sep 2024 02:21:11 GMT
ETag: 0x8DCDDD1E3AF2C76
Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id: 0d86e878-601e-0013-6cbc-0f73e6000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Tue, 01 Oct 2024 20:18:30 GMT
Connection: keep-alive
-
Remote address:8.8.8.8:53Requestwww.microsoft.comIN AResponsewww.microsoft.comIN CNAMEwww.microsoft.com-c-3.edgekey.netwww.microsoft.com-c-3.edgekey.netIN CNAMEwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netwww.microsoft.com-c-3.edgekey.net.globalredir.akadns.netIN CNAMEe13678.dscb.akamaiedge.nete13678.dscb.akamaiedge.netIN A2.22.45.146
-
Remote address:2.22.45.146:80RequestGET /pkiops/crl/MicCodSigPCA2011_2011-07-08.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
If-Modified-Since: Mon, 03 Jun 2024 21:25:24 GMT
User-Agent: Microsoft-CryptoAPI/6.1
Host: www.microsoft.com
ResponseHTTP/1.1 200 OK
Content-Type: application/octet-stream
Content-MD5: cyz+t2uRxNE5eKALjGZu1w==
Last-Modified: Sun, 18 Aug 2024 00:23:49 GMT
ETag: 0x8DCBF1C07FCB4BF
x-ms-request-id: 3d9a63db-b01e-003f-7816-f39f49000000
x-ms-version: 2009-09-19
x-ms-lease-status: unlocked
x-ms-blob-type: BlockBlob
Date: Tue, 01 Oct 2024 20:18:31 GMT
Connection: keep-alive
TLS_version: UNKNOWN
ms-cv: CASMicrosoftCV1b378e25.0
ms-cv-esi: CASMicrosoftCV1b378e25.0
X-RTag: RT
-
3.19.116.195:80http://www.playsushi.com/aj/inst.php?p=tLT%2Fyu7CwdO1u7G6sLGyyPD65vXgt7b%2FssG0x7e7xbTGu7a2tLfAwv%2Bj%2F7Ozs7Kzs7Oz%2F8zI%2F8zIhttp0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe748 B 284 B 12 3
HTTP Request
GET http://www.playsushi.com/aj/inst.php?p=tLT%2Fyu7CwdO1u7G6sLGyyPD65vXgt7b%2FssG0x7e7xbTGu7a2tLfAwv%2Bj%2F7Ozs7Kzs7Oz%2F8zI%2F8zIHTTP Response
302 -
172.67.70.191:443https://www.hugedomains.com/domain_profile.cfm?d=playsushi.comtls, http0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe1.8kB 49.2kB 29 47
HTTP Request
GET https://www.hugedomains.com/domain_profile.cfm?d=playsushi.comHTTP Response
200 -
142.250.179.227:80http://c.pki.goog/r/r4.crlhttp0745b720c0330c64f6047024027b0fe7_JaffaCakes118.exe606 B 5.0kB 8 6
HTTP Request
GET http://c.pki.goog/r/gsr1.crlHTTP Response
200HTTP Request
GET http://c.pki.goog/r/r4.crlHTTP Response
200 -
399 B 1.7kB 4 4
HTTP Request
GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crlHTTP Response
200 -
393 B 1.7kB 4 4
HTTP Request
GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crlHTTP Response
200
-
63 B 193 B 1 1
DNS Request
www.playsushi.com
DNS Response
3.19.116.1953.18.7.81
-
65 B 113 B 1 1
DNS Request
www.hugedomains.com
DNS Response
172.67.70.191104.26.6.37104.26.7.37
-
56 B 107 B 1 1
DNS Request
c.pki.goog
DNS Response
142.250.179.227
-
63 B 162 B 1 1
DNS Request
crl.microsoft.com
DNS Response
2.19.117.102.19.117.18
-
63 B 230 B 1 1
DNS Request
www.microsoft.com
DNS Response
2.22.45.146
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD55b423b4dcae4f711c0eff1ded431e29e
SHA1b86518fd4dcb4197fea1f46e72b8d031d82f0523
SHA2567aef51bfd9461e2770c96738808f22140db7f31e5b2c33fa7bdb72e3ebf53e02
SHA512c063058cbc7fb567092141b7d574ac34dfd7b343329935385c4eff990a988b587bbebd672e8eb52f8671044c222093d8db7ad22634209a111cfac20df8cf1fac