Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe
-
Size
477KB
-
MD5
f4891c4b2d5d817c50477bb8fa11c0a4
-
SHA1
ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a
-
SHA256
598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86
-
SHA512
a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e
-
SSDEEP
6144:5JzKf/zmCja4qQmQCrcbnFuuUcTFx0T21BOcCSaa1MSSB6T1KpQcHCbhI:5JY1ja4qQ+rcbFudkuN/S/1MSSPQcHKa
Malware Config
Extracted
formbook
3.9
fr
geturstuff.life
kisakollections.com
bkipmtahuna.com
aoxou.com
thebigandfreeupdates.download
utvtribe.com
icontoken.com
naturexperience.com
h2sentertainmentcafe.com
careerproresumepa.com
franchiseindia.directory
psychouniversity.com
traveng.com
mylifestylebyclem.com
greentmraelty.com
imoneg.com
lupusrebelacademy.com
ghqxc.info
lylulidbd.com
dalfreestyle.com
cloudinerd.com
nexuscero.com
teacherqiu.com
thegotore.com
xn--uj1aq81b.ink
aj7u52.com
livingbcnarea.com
olbst.com
rane.ltd
awesomecoopervip.com
kxmdq.com
mamahux.info
mailserverlayer.net
livelearnheal.net
faizki.com
myclarabella.com
adxcreative.net
becomeoneevents.com
village-gabarrier.com
portablestations.com
routerlogin.tips
news3038.ltd
joyfashionclothes.com
wzlghb.com
boxcleversashwindows.com
mikesquickdeals4u.com
lossensuales.com
carinsurancequotesowc.info
hapuo.com
brandongallups.com
preloadmypc.com
nbmimc.com
zengerfarm.com
microfibrebeachtowel.com
runamokproductions.com
bjtaiyan.com
depressiontalks.com
rememberaways.info
xionolif.world
988qipaiq.com
bzlouti.com
candidofleitas.com
arnieslonglifetea.com
xbelief.com
smaleg.com
Signatures
-
Formbook payload 4 IoCs
resource yara_rule behavioral2/memory/4832-20-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/4832-26-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/3748-32-0x00000000008A0000-0x00000000008CA000-memory.dmp formbook behavioral2/memory/3748-38-0x00000000008A0000-0x00000000008CA000-memory.dmp formbook -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3936 syscheck.exe 4832 syscheck.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sysmgr = "C:\\Users\\Admin\\AppData\\Local\\syscheck.exe -boot" syscheck.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3936 set thread context of 4832 3936 syscheck.exe 103 PID 4832 set thread context of 3328 4832 syscheck.exe 56 PID 3748 set thread context of 3328 3748 WWAHost.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4832 syscheck.exe 4832 syscheck.exe 4832 syscheck.exe 4832 syscheck.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe 3748 WWAHost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4832 syscheck.exe 4832 syscheck.exe 4832 syscheck.exe 3748 WWAHost.exe 3748 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2800 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe Token: SeDebugPrivilege 3936 syscheck.exe Token: SeDebugPrivilege 4832 syscheck.exe Token: SeShutdownPrivilege 3328 Explorer.EXE Token: SeCreatePagefilePrivilege 3328 Explorer.EXE Token: SeDebugPrivilege 3748 WWAHost.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3328 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2800 wrote to memory of 4688 2800 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 93 PID 2800 wrote to memory of 4688 2800 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 93 PID 2800 wrote to memory of 4688 2800 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 93 PID 2800 wrote to memory of 4520 2800 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 99 PID 2800 wrote to memory of 4520 2800 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 99 PID 2800 wrote to memory of 4520 2800 f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe 99 PID 4520 wrote to memory of 3936 4520 cmd.exe 101 PID 4520 wrote to memory of 3936 4520 cmd.exe 101 PID 4520 wrote to memory of 3936 4520 cmd.exe 101 PID 3936 wrote to memory of 4832 3936 syscheck.exe 103 PID 3936 wrote to memory of 4832 3936 syscheck.exe 103 PID 3936 wrote to memory of 4832 3936 syscheck.exe 103 PID 3936 wrote to memory of 4832 3936 syscheck.exe 103 PID 3936 wrote to memory of 4832 3936 syscheck.exe 103 PID 3936 wrote to memory of 4832 3936 syscheck.exe 103 PID 3328 wrote to memory of 3748 3328 Explorer.EXE 104 PID 3328 wrote to memory of 3748 3328 Explorer.EXE 104 PID 3328 wrote to memory of 3748 3328 Explorer.EXE 104 PID 3748 wrote to memory of 4124 3748 WWAHost.exe 105 PID 3748 wrote to memory of 4124 3748 WWAHost.exe 105 PID 3748 wrote to memory of 4124 3748 WWAHost.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\f4891c4b2d5d817c50477bb8fa11c0a4_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:4688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\syscheck.exe"C:\Users\Admin\AppData\Local\syscheck.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\syscheck.exe"3⤵PID:4124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD5f4891c4b2d5d817c50477bb8fa11c0a4
SHA1ce348c1ffa3a29ae6d318d9ab1f3fdede334e24a
SHA256598667091482e960508b94f2f46f6a6895afe071f3e37cd27cb4989865c2ee86
SHA512a545659229b733c74c7f402bcca6fe037ca53d11f4f07a2b62938474d2c22a5a9be77348967fb3a06ef6cd28dfd0da420b129a8c80d526e176c7d907c76f075e