Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 15:12
Behavioral task
behavioral1
Sample
eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe
-
Size
27KB
-
MD5
eb5b5b157be1e20fd94602216eb6d21c
-
SHA1
cad34712fd3220e44c7acb936dc75bf7545d598f
-
SHA256
79f4d3f5ac8b751e5fb3630e3bd4d8e50e3ba4f02974a391770bab96d252cc3e
-
SHA512
4bcbdf85e962b6638a3ea2effe8adc81b29828e2b83e32d89530d79fb88260a848592d77fefdda5a2140b56a035e6abb2c5e68ed3a83648de8e611f47608b3d8
-
SSDEEP
768:6w3N/A0gSXKeh5dX+tTuBvG2g3UHbTnn4Lgq:6OTgSnQqbDn4Eq
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "services.exe" eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1212 ~24062650.exe -
resource yara_rule behavioral2/memory/4872-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4872-1-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4872-2-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4872-3-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4872-12-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msconfig = "C:\\Windows\\system32\\eRp8m.exe" eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\eRp8m.exe eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 1212 ~24062650.exe 1212 ~24062650.exe 1212 ~24062650.exe 1212 ~24062650.exe 1212 ~24062650.exe 1212 ~24062650.exe 1212 ~24062650.exe 1212 ~24062650.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4872 wrote to memory of 1212 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 93 PID 4872 wrote to memory of 1212 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 93 PID 4872 wrote to memory of 1212 4872 eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe 93 PID 1212 wrote to memory of 1832 1212 ~24062650.exe 94 PID 1212 wrote to memory of 1832 1212 ~24062650.exe 94 PID 1212 wrote to memory of 1832 1212 ~24062650.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb5b5b157be1e20fd94602216eb6d21c_JaffaCakes118.exe"1⤵
- Sets file execution options in registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\~24062650.exeC:\Users\Admin\AppData\Local\Temp\~24062650.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd3⤵PID:1832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5d521180c52614ce57084e587c3cd84f2
SHA1c601e75888834c799734004a40b06ca0170c13c2
SHA25691690b0d0e2a34b0b935bbe4d54a756bf956d9447e2b9c0e32eaa06ed049d526
SHA512eecd9348ba1e2ff69ef6db0ddba388d850bdfe9b3c93594a699eb74c06dec61b6f50ef0820db25a4a8482cc6c4b37613e80371405f8e74476d65519381944279