Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe
-
Size
15.9MB
-
MD5
165e122dd5fc0567b2da9b4f7e7a1a19
-
SHA1
f7d0f4d592455e30f1a622d6a8d156dcd39f37c0
-
SHA256
80f3e5dd2001b73fa54d340684fb5e4bd20cef1bc2dfc0cf61964b012c14d39e
-
SHA512
e6af81543eb3eb6e2826c0d20f5d3bfd427cf1bd5fac2811065491967b9de9b9be66ed026aa8a1b813d3486bd7c47acc706497204074975194e425cd6e71131e
-
SSDEEP
393216:kg7ucg7ucg7ucg7ucg7ucg7ucg7ucg7uv:5ShShShShShShShSv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 2676 7D57AD13E21.exe 2344 Scegli_nome_allegato.exe 2220 7D57AD13E21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2676 set thread context of 2220 2676 7D57AD13E21.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3656 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2344 Scegli_nome_allegato.exe 2344 Scegli_nome_allegato.exe 2344 Scegli_nome_allegato.exe 2220 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3456 wrote to memory of 3656 3456 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe 105 PID 3456 wrote to memory of 3656 3456 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe 105 PID 3456 wrote to memory of 3656 3456 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe 105 PID 3456 wrote to memory of 2676 3456 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe 107 PID 3456 wrote to memory of 2676 3456 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe 107 PID 3456 wrote to memory of 2676 3456 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe 107 PID 3456 wrote to memory of 2344 3456 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe 108 PID 3456 wrote to memory of 2344 3456 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe 108 PID 3456 wrote to memory of 2344 3456 165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe 108 PID 2676 wrote to memory of 2220 2676 7D57AD13E21.exe 109 PID 2676 wrote to memory of 2220 2676 7D57AD13E21.exe 109 PID 2676 wrote to memory of 2220 2676 7D57AD13E21.exe 109 PID 2676 wrote to memory of 2220 2676 7D57AD13E21.exe 109 PID 2676 wrote to memory of 2220 2676 7D57AD13E21.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\165e122dd5fc0567b2da9b4f7e7a1a19_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:3656
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3792 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:4236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.9MB
MD54d9000c4481b62aa7977e81cf663c226
SHA1febfe33b9e305c606723add74b20a67acdc2a38a
SHA2568586b0013673d204e1d06082679f41b043edb6d294a1a55ac71150eabaafcb8f
SHA512edf1399757edde21caf72fd7542149ecd079b4afb54539e43f46b5001817a6f5553ea82ef6f7b6ee78443ea9720cfa9891e544d30f93cfb37dea9195b55f5665
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad