Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe
-
Size
247KB
-
MD5
f234e1d047588d72175f6510ddaf726c
-
SHA1
45f7dabaa03be229c8b6e32b78b07e68c363d7f5
-
SHA256
b333cc80d09dc553855ddeaa5c82848fb4735d97ad666f0f95abf431f1868c8b
-
SHA512
8617a2242884f2426f0b74df4986a366b19c7ae69008651bfd588622d0ab096736978ef6fa4c03c295fd921b3dacbaaf6a106d5797eb9a5b34413c2ac49cd585
-
SSDEEP
3072:PDaJiGcR+aGTSFq0XT7q8uxJK1met5AomHNWv3JPTPAF9mrLzPSilciWoq:P2JiGcR3XMhpJO56NG3VT88rLzPS66
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3928 podilm.exe -
Loads dropped DLL 1 IoCs
pid Process 3928 podilm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2000 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4112 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3928 podilm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2000 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3928 podilm.exe 3928 podilm.exe 3928 podilm.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3928 podilm.exe 3928 podilm.exe 3928 podilm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1444 wrote to memory of 3908 1444 f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe 91 PID 1444 wrote to memory of 3908 1444 f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe 91 PID 1444 wrote to memory of 3908 1444 f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe 91 PID 3908 wrote to memory of 2000 3908 cmd.exe 93 PID 3908 wrote to memory of 2000 3908 cmd.exe 93 PID 3908 wrote to memory of 2000 3908 cmd.exe 93 PID 3908 wrote to memory of 4112 3908 cmd.exe 97 PID 3908 wrote to memory of 4112 3908 cmd.exe 97 PID 3908 wrote to memory of 4112 3908 cmd.exe 97 PID 3908 wrote to memory of 3928 3908 cmd.exe 99 PID 3908 wrote to memory of 3928 3908 cmd.exe 99 PID 3908 wrote to memory of 3928 3908 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 1444 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\f234e1d047588d72175f6510ddaf726c_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\podilm.exe -f2⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 14443⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:4112
-
-
C:\Users\Admin\AppData\Local\podilm.exeC:\Users\Admin\AppData\Local\podilm.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3928
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD5f234e1d047588d72175f6510ddaf726c
SHA145f7dabaa03be229c8b6e32b78b07e68c363d7f5
SHA256b333cc80d09dc553855ddeaa5c82848fb4735d97ad666f0f95abf431f1868c8b
SHA5128617a2242884f2426f0b74df4986a366b19c7ae69008651bfd588622d0ab096736978ef6fa4c03c295fd921b3dacbaaf6a106d5797eb9a5b34413c2ac49cd585