Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe
-
Size
23KB
-
MD5
43f80c13eba1c24db5b886b1ef80171f
-
SHA1
628c306f413540ef61ac46ba99265743ed775c62
-
SHA256
06cce93a2695dd6f4d3ac92cbe2570ceea5d780e316c1e62f2c4786db3c72236
-
SHA512
e009479cf1328a212c009f50a575d1f3eee978443399e498dea0a313847d5ab76aca3fa2098883aa6b1264931238971145ee2f4df5675398aea0cca3408060cc
-
SSDEEP
384:UsyIO9nHedQMvezk0xmIGz0+/o/PaMM8u8f/axPYzzAWiw4gdbdBMD6uI6loA:kj84frG4+OCVa/axmViwFdBMOuIE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 972 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "C:\\Windows\\csrss.exe" csrss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\csrss.exe 43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe File opened for modification C:\Windows\csrss.exe 43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ielowutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" csrss.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31137396" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{222F2268-8A68-11EF-AEE2-5EA348B38F9D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4135950961" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31137396" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4220482579" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4135950961" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31137396" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435701507" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70edc5ee741edb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000086445aa8a430244a91c2b800ab210a51000000000200000000001066000000010000200000008cc6d68ab8d813836b9d345453ce8b393edf9baf3a8637d2ddd099a25c15cd3a000000000e8000000002000020000000952799c6a1112471aa78b593a024a795662b14704c0b28d0499160d479d2d3d9200000009c34de255728a92043dc23e33ae01eb4aaa30e086b35cc3dc25f82fe884ae68040000000e936f8a4bb7e3f0cc0bdc61bc69f58ac9429dee21bf1a747e6f4b358d0695a66809fa1c5ac3be53dcbc5e7a29c0f6cea6e9a52d31481e28890b3a41ce515657f iexplore.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4616 iexplore.exe 4616 iexplore.exe 4616 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4616 iexplore.exe 4616 iexplore.exe 2188 IEXPLORE.EXE 2188 IEXPLORE.EXE 4616 iexplore.exe 4616 iexplore.exe 1904 IEXPLORE.EXE 1904 IEXPLORE.EXE 4616 iexplore.exe 4616 iexplore.exe 552 IEXPLORE.EXE 552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2188 4616 iexplore.exe 93 PID 4616 wrote to memory of 2188 4616 iexplore.exe 93 PID 4616 wrote to memory of 2188 4616 iexplore.exe 93 PID 3224 wrote to memory of 972 3224 43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe 100 PID 3224 wrote to memory of 972 3224 43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe 100 PID 3224 wrote to memory of 972 3224 43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe 100 PID 3224 wrote to memory of 2384 3224 43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe 101 PID 3224 wrote to memory of 2384 3224 43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe 101 PID 3224 wrote to memory of 2384 3224 43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe 101 PID 4616 wrote to memory of 1904 4616 iexplore.exe 103 PID 4616 wrote to memory of 1904 4616 iexplore.exe 103 PID 4616 wrote to memory of 1904 4616 iexplore.exe 103 PID 4616 wrote to memory of 552 4616 iexplore.exe 104 PID 4616 wrote to memory of 552 4616 iexplore.exe 104 PID 4616 wrote to memory of 552 4616 iexplore.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43f80c13eba1c24db5b886b1ef80171f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\csrss.exeC:\Windows\csrss.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
PID:972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat2⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4692
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4616 CREDAT:17410 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4616 CREDAT:17418 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4616 CREDAT:17422 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
260B
MD50e8c07b9d848d921dbced195ac9e2a29
SHA19af3d3994d8d9b349ad9751bf07df6a69b95b151
SHA256f9937154dd4c95af3541c0c500a6ee9cd74e41e82bfc9fe091cf48bda166d04d
SHA512f2dc479df6998e954cfbd6ab0ac3c33cc67953eae94085dd5dce6c0edc3de03e8e0924428cbe8d0e012193e019f024ea7b0f0ae753aedce71d2d3e8e0586975b
-
Filesize
37B
MD51ad60c455a9b5e58d5a0b93577094275
SHA1884e0d8a99f453440b8f172c271f301e10862c98
SHA25606528e003ef037734f0697b4900bc9ee570bc5fec0edf9bc60b1131293581e58
SHA5129674964002e688be9f6dd079e8a3d7c6b5cb80d0422c8ca0f4af36653c2d0718e27ad9c10146b07c6bedaa5c20b09360ad786efdcd26a9cda6e8c8eb4970442a
-
Filesize
65B
MD5e29b8b5f9b14cbee53bfa89edeaf1428
SHA138d08ffd4a99fb9e8153754787f23c424bc3d6f4
SHA2567e69619337ee4e978b11c90c5a5625d0c5e7b1ed5d275cd99804cee02bb998f7
SHA512baa41df8d2579caa8d7f25733a2ca4435d07432da7326b6891737b4dc476d4fa20754a48c7b42d9e9d493d62f3c2dfa224498c904a54b1ce6bdabe9f85968c63
-
Filesize
8B
MD52b0af526f63f53b600f44563dea495bf
SHA1c68d07460fb7357661084c5790adaef44f5148fe
SHA256d014253c7851b8e9a19405bdf737091240167361bc281a5affdf78052bd6d549
SHA51211c9b6d4396e86622bd7394c113e2fa49a9de800927f5229f63ace7b2589bb69512c1f523471b7c6c558a4124dc8adb33f80c521a5afeb94085a37ee61af17c0
-
Filesize
65B
MD5aea58a670a3574f3e0a8d65d8a569ee4
SHA1fb6557c24d3674ea1f9069976e23c15c5ffcd708
SHA25656a534cd0bace3a6e359061d663eb2bdc9d929dddd728fdceddfc4768b16095a
SHA5121dacccfb6eaa2e408bc57d58b911cf5f91e44be725c41bf92295ca8c1df0d622ce8cc4e92e8afd532769361e4ab0c174cb795815587c4380227b9b27b55fa078
-
Filesize
23KB
MD543f80c13eba1c24db5b886b1ef80171f
SHA1628c306f413540ef61ac46ba99265743ed775c62
SHA25606cce93a2695dd6f4d3ac92cbe2570ceea5d780e316c1e62f2c4786db3c72236
SHA512e009479cf1328a212c009f50a575d1f3eee978443399e498dea0a313847d5ab76aca3fa2098883aa6b1264931238971145ee2f4df5675398aea0cca3408060cc