Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe
-
Size
39KB
-
MD5
137528acd9be93694ab01c418f4fa355
-
SHA1
c40a78442034a67ecc738b144d1a47ef270366fd
-
SHA256
12ee761153a79a64cf24be1a024d3a744368aa86c2e04e99bf8ca176419d6dd2
-
SHA512
ae21f4c92e1e37284f26639fca185242613f3e3fcc60de2ff7b2593fd9deab75855f0e77a9ca0e461ced07aa2f2ec860d7cba2a39c7c7abf560623eabe848173
-
SSDEEP
768:8Wi44tUqvSEbVkDeCFtkUxucrFtVKR1B9X3A25GnQlDFMdopE5z8c82MTUT:Xk0EmbxuQFtq1B9X3A25JlDFMdmvfG
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\dlmcjjcdfc = "C:\\Windows\\system\\jjxzwzjy090202.exe" 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system\jjxzwzjy090202.exe 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe File opened for modification C:\Windows\system\jjxzajcj32dl.dll 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe File created C:\Windows\system\jjxzajcj32dl.dll 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe File created C:\Windows\system\jjxzwzjy090202.exe 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31135325" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434811849" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2435235918" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31135325" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2432267119" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{BC94AD56-8250-11EF-AC6B-5E50324ADEFE} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2432267119" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31135325" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe Token: SeDebugPrivilege 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe Token: SeDebugPrivilege 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe Token: SeDebugPrivilege 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 880 iexplore.exe 880 iexplore.exe 4108 IEXPLORE.EXE 4108 IEXPLORE.EXE 4108 IEXPLORE.EXE 4108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1980 wrote to memory of 880 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 86 PID 1980 wrote to memory of 880 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 86 PID 880 wrote to memory of 4108 880 iexplore.exe 87 PID 880 wrote to memory of 4108 880 iexplore.exe 87 PID 880 wrote to memory of 4108 880 iexplore.exe 87 PID 1980 wrote to memory of 880 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 86 PID 1980 wrote to memory of 3464 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 91 PID 1980 wrote to memory of 3464 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 91 PID 1980 wrote to memory of 3464 1980 137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:880 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5db7c83e09ebc4317f2bf2df7f66b8513
SHA129d58ef43f72ce7cf79ce6109d038a6c9b4873f0
SHA2561ae4c8aa37bf433bc5b3b45e017c95bf843c7dbbe348c78c7ab6f3cad0fda4b8
SHA5126eb46ae0c3e091ba13b1c0e3fb6de568882940df7968d0e1297568ea5356a4691f2a869c7c9ac9e9642bcc2e4e1388d00b15c663276143e8cb5015ab89c27867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5adacfec76247dca1e0d2546523867512
SHA1366bde51959c0558c84108dda8019c39e7b6f6d6
SHA25614ea360bb6627c8918771d65cd2762a2bde2de0426886f4d77ae9a371082d20c
SHA5125fced6817aaeaadf8217c23b7f00cf6f80bb901a84e052febf51eb367074069ad8faeb4eee7c1fc7bb14e7fc812223ffccf790ba00b9ef94750fed9e7d349617
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee