Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe
-
Size
72KB
-
MD5
24310e18df24dce9dd757dd643b17398
-
SHA1
3e751af035730133afbe938d1048b5997e19330f
-
SHA256
069bfaa0ce8344b1a11979bce00f3f1ae933102684ff89c62f5f7eb6e27e11fc
-
SHA512
0f54d8424edef58e1f984269dc1b2506f56d98db1ae4bd0dc5d2f46b51410ca49234fdea4d8687079f54dec461204d6b0beb6b7b5e3b9163dde56b2c0dc0b3da
-
SSDEEP
768:j/aw1owYOWJOaogydP+XfLDvlexvluI9Oty/N/X+YVhP5itZfP6v+XyjC:raw1owcxfHIxvluiEmNfP8Sv+6C
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" njroid.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4608 njroid.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\njroid = "C:\\Users\\Admin\\njroid.exe" njroid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe 4608 njroid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 972 24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe 4608 njroid.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 972 wrote to memory of 4608 972 24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe 91 PID 972 wrote to memory of 4608 972 24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe 91 PID 972 wrote to memory of 4608 972 24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe 91 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85 PID 4608 wrote to memory of 972 4608 njroid.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24310e18df24dce9dd757dd643b17398_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\njroid.exe"C:\Users\Admin\njroid.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5d07758dca7cd6c6f07ebc161c55f961a
SHA1f67b3d5244d792ef14b463fd20402f65ee2efe38
SHA2569b20a1848703ec9b51f5cab84315d36983418bfaf6957c55730e7dc04292de0c
SHA51272d741946ac344fb3fbe7d31500f6e1d603bb5be8ef076e5bb1f581256026bec425586bb5e5c9a0e18a68a6c7dc8e3749a2c2ec2a28eb1d152f1506e927deee4