Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2025, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe
-
Size
65KB
-
MD5
618b202cab71cf24b730c76c90d5a4b1
-
SHA1
2ea352456fb807e31ce4195bdc72fb2c59392bff
-
SHA256
07878acff54ac0dce8b62a25774290bc6d190695cf4326db4e475bee84ab20cd
-
SHA512
e215bf5efd8410f417d096836dbc611fd7bd19e73cf4fa86f4ca5340eb11282e9eecf4b6b715d1405eff82cdcf4d71e26cacb3de68f066634e054c41e4fbb362
-
SSDEEP
1536:SVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApE:CnxwgxgfR/DVG7wBpE
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 3188 WaterMark.exe -
resource yara_rule behavioral2/memory/2368-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2368-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2368-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2368-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3188-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2368-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2368-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2368-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3188-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3188-36-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3188-37-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxB93E.tmp JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4488 4936 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "12401585" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153325" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2C3BD9E8-C8A0-11EF-9361-5EA348B38F9D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "9901786" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2C3976DF-C8A0-11EF-9361-5EA348B38F9D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153325" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153325" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153325" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "12401585" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "9901786" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442542548" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe 3188 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3188 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2908 iexplore.exe 1280 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1280 iexplore.exe 1280 iexplore.exe 2908 iexplore.exe 2908 iexplore.exe 224 IEXPLORE.EXE 224 IEXPLORE.EXE 4364 IEXPLORE.EXE 4364 IEXPLORE.EXE 224 IEXPLORE.EXE 224 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2368 JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe 3188 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3188 2368 JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe 82 PID 2368 wrote to memory of 3188 2368 JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe 82 PID 2368 wrote to memory of 3188 2368 JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe 82 PID 3188 wrote to memory of 4936 3188 WaterMark.exe 83 PID 3188 wrote to memory of 4936 3188 WaterMark.exe 83 PID 3188 wrote to memory of 4936 3188 WaterMark.exe 83 PID 3188 wrote to memory of 4936 3188 WaterMark.exe 83 PID 3188 wrote to memory of 4936 3188 WaterMark.exe 83 PID 3188 wrote to memory of 4936 3188 WaterMark.exe 83 PID 3188 wrote to memory of 4936 3188 WaterMark.exe 83 PID 3188 wrote to memory of 4936 3188 WaterMark.exe 83 PID 3188 wrote to memory of 4936 3188 WaterMark.exe 83 PID 3188 wrote to memory of 2908 3188 WaterMark.exe 87 PID 3188 wrote to memory of 2908 3188 WaterMark.exe 87 PID 3188 wrote to memory of 1280 3188 WaterMark.exe 88 PID 3188 wrote to memory of 1280 3188 WaterMark.exe 88 PID 1280 wrote to memory of 4364 1280 iexplore.exe 89 PID 1280 wrote to memory of 4364 1280 iexplore.exe 89 PID 1280 wrote to memory of 4364 1280 iexplore.exe 89 PID 2908 wrote to memory of 224 2908 iexplore.exe 90 PID 2908 wrote to memory of 224 2908 iexplore.exe 90 PID 2908 wrote to memory of 224 2908 iexplore.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_618b202cab71cf24b730c76c90d5a4b1.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 2084⤵
- Program crash
PID:4488
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:224
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1280 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4364
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4936 -ip 49361⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5618b202cab71cf24b730c76c90d5a4b1
SHA12ea352456fb807e31ce4195bdc72fb2c59392bff
SHA25607878acff54ac0dce8b62a25774290bc6d190695cf4326db4e475bee84ab20cd
SHA512e215bf5efd8410f417d096836dbc611fd7bd19e73cf4fa86f4ca5340eb11282e9eecf4b6b715d1405eff82cdcf4d71e26cacb3de68f066634e054c41e4fbb362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD530f59b20e935520badc298242cb4cff1
SHA100622b2054eb148a8459c2ccd0b22606c2d5c7f6
SHA2564a981d199e551f2b8c8fa22f0e3fbc264e876e5ed243d83331b2a6083a753e3c
SHA512f22ca09eb3266cee3f363e4f3f955745382679d136d61e7c27f81081cd77efa5f82f82220526928f73049e692b7c060f64032dfae0f967c579c6e6acfd2e8d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5f66890944ee09af3c88d8bb0cac652e5
SHA1aa314838b9e0111ab378850007fdcb86dfae310b
SHA256ba47d17716a1275aaa960a7cbf4165a139d5d05b17fb782d05ff00bee4170635
SHA512eab44f1500444133c2963467824ff622c1b2095989af251a488887f9def9a6362d94db9dcbccb8d3b78fd57bef09426d8b832eb5f2e0e938a568c8ace608a515
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2C3976DF-C8A0-11EF-9361-5EA348B38F9D}.dat
Filesize5KB
MD55069ba8316d6c2b373c779439401bde4
SHA1564390de7f08531837204abb17270d36e0acbbf9
SHA256cf843930c56e5d400a0fba82e7bc76cfe9de80f02302a45481c56d634229208d
SHA51254ce58b132ee2f9e5e43718eb332b55844ed0a278cb24afa662fb4ca63e39932c99e3cf1afda65a6474f08e745bbaf6b783795a103c42780c67d33e4a0d0013e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{2C3BD9E8-C8A0-11EF-9361-5EA348B38F9D}.dat
Filesize3KB
MD51d8fcb58b1b0319dc2c52b7d2b035e0e
SHA1afe46e2b60e1b3243ca06ef862512baa8981cbd9
SHA2566eab18ff5d7fba24c05e75cbfca0356ed81547a6b9ca0ec9a5fdb3a85df314cb
SHA512db963cb686aae226eb2a9cc007bd19bda04cd4475cef3301d83921d48f80a844f2e7fe26f7c649fadef59bbd6a3e46a80eb6fe5fb40f46458b6b6ed8757a4bb5
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee