Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
451d8073e69e4ca14cba626553f24755
-
SHA1
2bd06aa070546ed780fda61f77875b7eff07ca6c
-
SHA256
655ec66ff682343e7688645d75ad2b5b1fb66057643a2ef851434db8e13ad5b1
-
SHA512
f1c1033acfc96f501ef7343ea6d0f4ba8fa694c2ce8ee671c83fc32da37794811209bcdd185440ea00ee7546e275a46083d7e1eabd1b6197dba64a4a9d917189
-
SSDEEP
24576:uMfmMfmMfmMfmMfmMfmMfmMfmMfmMfmMfmMfmMff:uffffffffffffa
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mmmmmmmmm.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 208 netsh.exe 2928 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation mmmmmmmmm.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\02568bbb6a54174796ee8e7434fcdefc.exe mmmmmmmmm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\02568bbb6a54174796ee8e7434fcdefc.exe mmmmmmmmm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\02568bbb6a54174796ee8e7434fcdefc.exe wscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 mmmmmmmmm.exe -
Loads dropped DLL 2 IoCs
pid Process 3032 wscript.exe 3032 wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\02568bbb6a54174796ee8e7434fcdefc = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\mmmmmmmmm.exe\" .." mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\02568bbb6a54174796ee8e7434fcdefc = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\mmmmmmmmm.exe\" .." mmmmmmmmm.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\02568bbb6a54174796ee8e7434fcdefc = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\mmmmmmmmm.exe\" .." wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\02568bbb6a54174796ee8e7434fcdefc = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\mmmmmmmmm.exe\" .." wscript.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmmmmmmmm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mmmmmmmmm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmmmmmmmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\weaftjlebmc.weaftjlebmc mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\0.0.0.0\CodeBase = "file:///C:/Users/Admin/AppData/Local/Temp/mmmmmmmmm.exe" mmmmmmmmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\0.0.0.0 mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\ProgId\ = "weaftjlebmc.weaftjlebmc" mmmmmmmmm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\0.0.0.0 mmmmmmmmm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\Implemented Categories mmmmmmmmm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152} mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\Class = "weaftjlebmc.weaftjlebmc" mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\CodeBase = "file:///C:/Users/Admin/AppData/Local/Temp/mmmmmmmmm.exe" mmmmmmmmm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32 mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\weaftjlebmc.weaftjlebmc\ = "weaftjlebmc.weaftjlebmc" mmmmmmmmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\Implemented Categories mmmmmmmmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32 mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\RuntimeVersion = "v2.0.50727" mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{62C8FE65-4EBB-45E7-B440-6E39B2CDBF29}\0 = ".NET Category" mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\weaftjlebmc.weaftjlebmc\CLSID\ = "{52CB099C-0D9E-3A5D-A8F9-318F25A67152}" mmmmmmmmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152} mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\0.0.0.0\RuntimeVersion = "v2.0.50727" mmmmmmmmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\ThreadingModel = "Both" mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\0.0.0.0\Assembly = "weaftjlebmc, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null" mmmmmmmmm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\ = "weaftjlebmc.weaftjlebmc" mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\Assembly = "weaftjlebmc, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null" mmmmmmmmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\ProgId mmmmmmmmm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\weaftjlebmc.weaftjlebmc\CLSID mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\ = "mscoree.dll" mmmmmmmmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\InprocServer32\0.0.0.0\Class = "weaftjlebmc.weaftjlebmc" mmmmmmmmm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\weaftjlebmc.weaftjlebmc mmmmmmmmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\weaftjlebmc.weaftjlebmc\CLSID mmmmmmmmm.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{52CB099C-0D9E-3A5D-A8F9-318F25A67152}\ProgId mmmmmmmmm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1040 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe Token: SeDebugPrivilege 2432 mmmmmmmmm.exe Token: SeDebugPrivilege 3032 wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3032 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2432 1040 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe 87 PID 1040 wrote to memory of 2432 1040 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe 87 PID 1040 wrote to memory of 2432 1040 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe 87 PID 2432 wrote to memory of 208 2432 mmmmmmmmm.exe 96 PID 2432 wrote to memory of 208 2432 mmmmmmmmm.exe 96 PID 2432 wrote to memory of 208 2432 mmmmmmmmm.exe 96 PID 2432 wrote to memory of 2928 2432 mmmmmmmmm.exe 97 PID 2432 wrote to memory of 2928 2432 mmmmmmmmm.exe 97 PID 2432 wrote to memory of 2928 2432 mmmmmmmmm.exe 97 PID 2432 wrote to memory of 3032 2432 mmmmmmmmm.exe 100 PID 2432 wrote to memory of 3032 2432 mmmmmmmmm.exe 100 PID 2432 wrote to memory of 3032 2432 mmmmmmmmm.exe 100 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mmmmmmmmm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\451d8073e69e4ca14cba626553f24755_JaffaCakes118.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\mmmmmmmmm.exe"C:\Users\Admin\AppData\Local\Temp\mmmmmmmmm.exe"2⤵
- UAC bypass
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2432 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\mmmmmmmmm.exe" "mmmmmmmmm.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:208
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\SysWOW64\wscript.exe" "wscript.exe" ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\mmmmmmmmm.vbe"3⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD5451d8073e69e4ca14cba626553f24755
SHA12bd06aa070546ed780fda61f77875b7eff07ca6c
SHA256655ec66ff682343e7688645d75ad2b5b1fb66057643a2ef851434db8e13ad5b1
SHA512f1c1033acfc96f501ef7343ea6d0f4ba8fa694c2ce8ee671c83fc32da37794811209bcdd185440ea00ee7546e275a46083d7e1eabd1b6197dba64a4a9d917189
-
Filesize
54B
MD5ab0ec15dff055cadb7a2d3f53629d747
SHA143991dea301a1e892c1909d759a104382894947a
SHA2567631346fe22b7663d78f3e724298afaef37ad826656dc09708dbb5e76dca81f6
SHA512f5e0c107b6e669d43eb90b105e25b0f1d561096a6fc31e102730823e5ce5cb91694cd4880d691351d5548a6bbf1da6d8910f6b292222ae6a559c1863da29c8dd