Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe
-
Size
723KB
-
MD5
367177a2c74df8fa6b662ebad2013446
-
SHA1
b44778d66813707e80401a4acb483cdd25cf8085
-
SHA256
e884aa8d06807cbe7eadab2489ad4af0d0b86b7b51ef508642fc5865e94354af
-
SHA512
cf32bd96fd9e0dd83eb595626450947bbd29f9f190fc6fddf033b8426a9e670f25cd46aea20ef705c6d9bb3c4ca86f0ca3ffb05dbe3741a6dd1d04444ab551b5
-
SSDEEP
12288:n4WIJJoOCYzh9XvrkIa+lnL4R8//y94dmI9aSgIMUhMtJ+1satUD7sBVD51AaCPn:4vJJoN2hal+1ERiH9S3ztJ+eatUwR51u
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000015d41-4.dat acprotect -
Deletes itself 1 IoCs
pid Process 2864 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 536 syctim.exe -
Loads dropped DLL 6 IoCs
pid Process 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 536 syctim.exe 536 syctim.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\syctim.exe 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\syctim.exe 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe File created C:\Windows\SysWOW64\syctim.dll syctim.exe File opened for modification C:\Windows\SysWOW64\syctim.dll syctim.exe -
resource yara_rule behavioral1/files/0x0008000000015d41-4.dat upx behavioral1/memory/1704-6-0x0000000010000000-0x0000000010128000-memory.dmp upx behavioral1/memory/536-27-0x0000000010000000-0x0000000010128000-memory.dmp upx behavioral1/memory/1704-43-0x0000000010000000-0x0000000010128000-memory.dmp upx behavioral1/memory/536-53-0x0000000010000000-0x0000000010128000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\d2fce76d2086a8c6b01424411b5e91d0.dat syctim.exe File opened for modification C:\Windows\Fonts\d2fce76d2086a8c6b01424411b5e91d0.dat syctim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syctim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434836783" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00ED48D1-8807-11EF-9C49-4E0B11BE40FD} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" syctim.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 536 syctim.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 536 syctim.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1704 wrote to memory of 536 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 30 PID 1704 wrote to memory of 536 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 30 PID 1704 wrote to memory of 536 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 30 PID 1704 wrote to memory of 536 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 30 PID 536 wrote to memory of 2728 536 syctim.exe 31 PID 536 wrote to memory of 2728 536 syctim.exe 31 PID 536 wrote to memory of 2728 536 syctim.exe 31 PID 536 wrote to memory of 2728 536 syctim.exe 31 PID 2728 wrote to memory of 2724 2728 IEXPLORE.EXE 32 PID 2728 wrote to memory of 2724 2728 IEXPLORE.EXE 32 PID 2728 wrote to memory of 2724 2728 IEXPLORE.EXE 32 PID 2728 wrote to memory of 2724 2728 IEXPLORE.EXE 32 PID 1704 wrote to memory of 2864 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 33 PID 1704 wrote to memory of 2864 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 33 PID 1704 wrote to memory of 2864 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 33 PID 1704 wrote to memory of 2864 1704 367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe 33 PID 536 wrote to memory of 2728 536 syctim.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\367177a2c74df8fa6b662ebad2013446_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\syctim.exeC:\Windows\system32\syctim.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\duxjpee.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505d75f28e5aed3b8d16e2133a418c8c7
SHA1dd76e774d0d6001fc5e9be4617f8c8afdc428e0f
SHA256670cf767151845e1a0f22590102d59884f7c21568eb227459ca6ae597207fa95
SHA512b5a4051422e1d41c4bd6ae8cfecc06b8c37400dbf908c7c6e2939355db0ea39639e6748693abcf5d3614a9a6bb2219118770bfb929b865e2b501ac5fbaa9738e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db23590e6de18f1bd643d8bb135794e9
SHA1529ea3680c0bb97edb24531ed33440391d4bdcf9
SHA256aaece813e1f30e6fbc789641a4bea7657f97012cf5c55b88c6681ff2f4493aa0
SHA512c566c88a9e072c2e673bed3d795f1fb5d939d9a50f5f92ef8666927dde2922433f771bb92a30f02fb26d4daf3fb1cb2ed1c2df99e4286e27bfcb6faa5624dfb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599a4cf4ddfe23257859e99ff72e4dc57
SHA1c03cece525a178005ab3d9b4580af4c0d500d85c
SHA2564ddf297d34c8c65b99f9e32cffda14e5fe34e1c6adb41f1ac11f97b586a36a71
SHA5124c31e32674b721c92d1d5969417bcb3656a1972d7689c75c4462118e255921dae758f06a6024e32eb6a87c5192d6668285dd87655db078663976157e8094e6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523dd687f7f67f7697a8f3f60456bb5f2
SHA135bc2ba878363c12aa741e7fdb03c3c5d01a6f9b
SHA2566545c4f6fe94ab4993e7c59ecff83cc4150dc323b7e21fd13aaf406da7057add
SHA51238f1e0bc392751336b38374a72b414662e117faaab4c258f5041c73a37428df467a581eca3fb4c3fa219d130880b5063e828c97413b56076552eecefe901f0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829d1ee3d9c4dcf298b1d3309842d3cb
SHA1293f860088e6cfb8548f064fb9aad712289dd9e7
SHA256fa1bde992e731cd5b3d6ccdfb12ac688fcbe035624b049b891ac0e415ce3a640
SHA512b85f0fafb946bc0138647332d15c2c358648a7d3877cbda34264c874a4329b33c92d2304e6e160abaec26636c0c98686bca568386e29546f7540bc09389ddd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321ebcec36991d720742b67352483490
SHA1bf0ca919c92cbecce5863744257002f125df089a
SHA2569c600d5f1368151c7ee18383ad9c564fec5e39bd25c86b05fb6d003d407494c1
SHA512fb311cfd4d077dc47ab834c43b553cd523f22c280dcad87306d21df3299fe8fa136c8c107f07e1f13ee9ae6dc6d300872231ebaa4ff7851d78fc2c8646cc0dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e34a5c17f0b784b887895a9c30b480e5
SHA19ba87bd8a834f41a76f9070364363e089cbd00c9
SHA256b1b55e6ae653f9fdf859b6ebbb6f23cde828f1aaced2490b16c2ef6fac47b1df
SHA5128450350f9460b19a9aebb18c999a70f15d462288d1effeed6bec31359c734b8a297238b7a43ac2e62600f6a6776ef6deea6f8f28e49a956c50cb6ea2946c2f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3060cc4cfb43a905fd3bd643a6b5dc9
SHA1c57c19802d59918175bec0128c6bca78f190c858
SHA256caac83f024339c648c2685cd3d69544869c26d9144dda96e0f4f3e7e9a5505fc
SHA5121cd342cba8e49c2b122a79c2ff7af7073564194a0e1cfe89f4ec6e63cce4e5d8ba367e61d548d28b20afd489838a866860b645ae8b4f737388a681816e2c40b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7874dacbaba8675be62908cb367d58f
SHA112247a75f2ec2575717b50b26a1c9a89a3e0db2a
SHA25693b815bf536dd397070d074e547cf2f34d2823fffc1486f8251386b13dfe143b
SHA51216c93297d964ff35531520c4fa718564093d17703e64331da9a4032479bd182e0a0f1aa63bcb01c7b29692381718cb3f0e790b21099a9146eeb584499a704ec3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
72KB
MD5f79ee77a4f30401507e6f54a61598f58
SHA17f3ef4945f621ed2880ff5a10a126957b2011a17
SHA256cf8e29720823eb114fbc3018569a7296ed3e6fcd6c4897f50c5c6e0e98d0b3f8
SHA51226ccde784b06c46f60fb5a105c806c4d9dc1497fd79d39728fbcfa869d470ca2ba018b0665f3cbc05019fb0766dac2eb1084a6fdce2f9aaaae881beb09dd3739
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
723KB
MD5367177a2c74df8fa6b662ebad2013446
SHA1b44778d66813707e80401a4acb483cdd25cf8085
SHA256e884aa8d06807cbe7eadab2489ad4af0d0b86b7b51ef508642fc5865e94354af
SHA512cf32bd96fd9e0dd83eb595626450947bbd29f9f190fc6fddf033b8426a9e670f25cd46aea20ef705c6d9bb3c4ca86f0ca3ffb05dbe3741a6dd1d04444ab551b5
-
Filesize
232B
MD545750a48e404dabf9ffeecb3045d84b8
SHA1bc6ccd4c7a65db56f3ec71bac050d1568a325d27
SHA2567a7d9a1733a60f036f98f5478542f03214db194b0b556401ac8ec1d6b11ba537
SHA5126121a6b1340767592e340cb5db8fe47419e84a1f144be3291b87689d934f4b1589d8a002e64c5776e779a60d7847c2f0cd4d0d18ffaf1bfaa39c143ddac9324d
-
Filesize
112KB
MD56d4b2e73f6f8ecff02f19f7e8ef9a8c7
SHA109c32ca167136a17fd69df8c525ea5ffeca6c534
SHA256fe5783e64aa70fac10c2e42d460732d9770534357329d8bc78576557c165f040
SHA5122fd7a95cb632e9c4ac6b34e5b6b875aae94e73cd4b1f213e78f46dadab4846227a030776461bca08f9d75a1d61a0d45427f7b0c8b71406b7debc14db04b2ce04
-
Filesize
407KB
MD5783a2f0cc9d2c13f2cb980b5bd198005
SHA1a1bafe779952f61946fe9003e48dddc65184c6da
SHA256e21bf808a0f4c0d6e971267bb61cb00bd9acf45ddabd6db90f906ba064a3489f
SHA512c35d6a39658722dc603e372c92ef18fe7700bfda435230cf5fc39c61c3044481a581cfe797c88fd131e6ecb5940ac31423b33b86b2d52e57df2a1c5669e2bbdc