Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 11:09 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe
-
Size
8.9MB
-
MD5
2074ab715fdd1eeb21ebe7af4d7a08a0
-
SHA1
868968c4653578a9b1e22a77981f2df8421975cc
-
SHA256
575175e7a4e9f822848f4d0a4486bb01cbd182716aee6dc34d450dcc1a07af09
-
SHA512
fe9f1b4aedc79cb6697b937ca23a0a55b33a5703dc200dd1eba5e7afe6f917a5fc6fec228a4fc7cdd92b398af7f8649c0c0a66c281e09d1b47b00dbab04b85a2
-
SSDEEP
196608:8Bazg7DSmBazg7DSm8Bazg7DSmBazg7DSmn:Rg7uDg7uIg7uDg7uA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 1796 7D57AD13E21.exe 2116 Scegli_nome_allegato.exe 388 7D57AD13E21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1796 set thread context of 388 1796 7D57AD13E21.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1104 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2116 Scegli_nome_allegato.exe 2116 Scegli_nome_allegato.exe 2116 Scegli_nome_allegato.exe 388 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1104 1396 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 97 PID 1396 wrote to memory of 1104 1396 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 97 PID 1396 wrote to memory of 1104 1396 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 97 PID 1396 wrote to memory of 1796 1396 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 99 PID 1396 wrote to memory of 1796 1396 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 99 PID 1396 wrote to memory of 1796 1396 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 99 PID 1396 wrote to memory of 2116 1396 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 100 PID 1396 wrote to memory of 2116 1396 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 100 PID 1396 wrote to memory of 2116 1396 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 100 PID 1796 wrote to memory of 388 1796 7D57AD13E21.exe 102 PID 1796 wrote to memory of 388 1796 7D57AD13E21.exe 102 PID 1796 wrote to memory of 388 1796 7D57AD13E21.exe 102 PID 1796 wrote to memory of 388 1796 7D57AD13E21.exe 102 PID 1796 wrote to memory of 388 1796 7D57AD13E21.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:1104
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:388
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestsunray1975.zapto.orgIN AResponse
-
Remote address:8.8.8.8:53Request40.134.221.88.in-addr.arpaIN PTRResponse40.134.221.88.in-addr.arpaIN PTRa88-221-134-40deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestsunray1975.zapto.orgIN AResponse
-
Remote address:8.8.8.8:53Requestsunray1975.zapto.orgIN AResponse
-
Remote address:8.8.8.8:53Request218.135.221.88.in-addr.arpaIN PTRResponse218.135.221.88.in-addr.arpaIN PTRa88-221-135-218deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestsunray1975.zapto.orgIN AResponse
-
Remote address:8.8.8.8:53Requestsunray1975.zapto.orgIN AResponse
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa
-
66 B 126 B 1 1
DNS Request
sunray1975.zapto.org
-
72 B 137 B 1 1
DNS Request
40.134.221.88.in-addr.arpa
-
66 B 126 B 1 1
DNS Request
sunray1975.zapto.org
-
66 B 126 B 1 1
DNS Request
sunray1975.zapto.org
-
73 B 139 B 1 1
DNS Request
218.135.221.88.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.236.111.52.in-addr.arpa
-
66 B 126 B 1 1
DNS Request
sunray1975.zapto.org
-
66 B 126 B 1 1
DNS Request
sunray1975.zapto.org
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.9MB
MD54d8b6bc510429f3a92a43bf0280b4c68
SHA1fc7efc34053a8c868c008198c24ff56c9ed954b1
SHA2563d924cc6e927bcbea8140cb0c1759bb9ed4b7c868f9cfd9f98b2dc60ed310048
SHA5125ad9514926527aff62472ecc8d4035cf54cfc358abab090ef727e59db5b86349327f4174179922b0fe612fba79188777ee86f2e007f141a2749e5823d537a0d4
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad