Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe
-
Size
38KB
-
MD5
f71d4d6864c51f508020ae23199edc09
-
SHA1
a243989c774dc8daf12c38dde04865ab1fe68736
-
SHA256
70c16904e1e54170c92d3e5b5e5d37091a7dd2a0cd5a1dbf30f25c97833a70cc
-
SHA512
c4d3176487b2ca8a626d296f2955b7d6e5ae96f94ed9dd5c9af9d7f3e2febf624991873f35133ddc8ac3efe6a3ac56af97750c5f0a545b75c5a15009f8db7e72
-
SSDEEP
768:tq8NdnDo0qD+5O1MbTQpKJN/gNCzjDM8XjefNJlSN6WfJCQr4QhYuHOPP+:48TDo0c+O70JN/S38TeVTSN6ydr4tuuO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3356 9129837.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ttool = "C:\\Windows\\9129837.exe" f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ttool = "C:\\Windows\\9129837.exe" 9129837.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\9129837.exe f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe File created C:\Windows\new_drv.sys 9129837.exe File created C:\Windows\9129837.exe f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3356 9129837.exe 3356 9129837.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 964 f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe Token: SeDebugPrivilege 3356 9129837.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 3356 964 f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe 86 PID 964 wrote to memory of 3356 964 f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe 86 PID 964 wrote to memory of 3356 964 f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe 86 PID 964 wrote to memory of 3672 964 f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe 88 PID 964 wrote to memory of 3672 964 f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe 88 PID 964 wrote to memory of 3672 964 f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe 88 PID 3356 wrote to memory of 612 3356 9129837.exe 5 PID 3356 wrote to memory of 672 3356 9129837.exe 7 PID 3356 wrote to memory of 768 3356 9129837.exe 8 PID 3356 wrote to memory of 776 3356 9129837.exe 9 PID 3356 wrote to memory of 792 3356 9129837.exe 10 PID 3356 wrote to memory of 912 3356 9129837.exe 11 PID 3356 wrote to memory of 956 3356 9129837.exe 12 PID 3356 wrote to memory of 376 3356 9129837.exe 13 PID 3356 wrote to memory of 752 3356 9129837.exe 14 PID 3356 wrote to memory of 1028 3356 9129837.exe 15 PID 3356 wrote to memory of 1064 3356 9129837.exe 16 PID 3356 wrote to memory of 1104 3356 9129837.exe 17 PID 3356 wrote to memory of 1124 3356 9129837.exe 18 PID 3356 wrote to memory of 1144 3356 9129837.exe 19 PID 3356 wrote to memory of 1184 3356 9129837.exe 20 PID 3356 wrote to memory of 1292 3356 9129837.exe 21 PID 3356 wrote to memory of 1324 3356 9129837.exe 22 PID 3356 wrote to memory of 1396 3356 9129837.exe 23 PID 3356 wrote to memory of 1412 3356 9129837.exe 24 PID 3356 wrote to memory of 1472 3356 9129837.exe 25 PID 3356 wrote to memory of 1580 3356 9129837.exe 26 PID 3356 wrote to memory of 1592 3356 9129837.exe 27 PID 3356 wrote to memory of 1688 3356 9129837.exe 28 PID 3356 wrote to memory of 1712 3356 9129837.exe 29 PID 3356 wrote to memory of 1772 3356 9129837.exe 30 PID 3356 wrote to memory of 1780 3356 9129837.exe 31 PID 3356 wrote to memory of 1908 3356 9129837.exe 32 PID 3356 wrote to memory of 2040 3356 9129837.exe 33 PID 3356 wrote to memory of 1364 3356 9129837.exe 34 PID 3356 wrote to memory of 1436 3356 9129837.exe 35 PID 3356 wrote to memory of 1700 3356 9129837.exe 36 PID 3356 wrote to memory of 1904 3356 9129837.exe 37 PID 3356 wrote to memory of 2152 3356 9129837.exe 38 PID 3356 wrote to memory of 2200 3356 9129837.exe 39 PID 3356 wrote to memory of 2244 3356 9129837.exe 40 PID 3356 wrote to memory of 2324 3356 9129837.exe 41 PID 3356 wrote to memory of 2544 3356 9129837.exe 42 PID 3356 wrote to memory of 2552 3356 9129837.exe 43 PID 3356 wrote to memory of 2620 3356 9129837.exe 44 PID 3356 wrote to memory of 2628 3356 9129837.exe 45 PID 3356 wrote to memory of 2676 3356 9129837.exe 46 PID 3356 wrote to memory of 2716 3356 9129837.exe 47 PID 3356 wrote to memory of 2788 3356 9129837.exe 48 PID 3356 wrote to memory of 2824 3356 9129837.exe 49 PID 3356 wrote to memory of 2832 3356 9129837.exe 50 PID 3356 wrote to memory of 2844 3356 9129837.exe 51 PID 3356 wrote to memory of 2852 3356 9129837.exe 52 PID 3356 wrote to memory of 2748 3356 9129837.exe 53 PID 3356 wrote to memory of 3388 3356 9129837.exe 55 PID 3356 wrote to memory of 3496 3356 9129837.exe 56 PID 3356 wrote to memory of 3644 3356 9129837.exe 57 PID 3356 wrote to memory of 3836 3356 9129837.exe 58 PID 3356 wrote to memory of 3924 3356 9129837.exe 59 PID 3356 wrote to memory of 3988 3356 9129837.exe 60 PID 3356 wrote to memory of 4068 3356 9129837.exe 61 PID 3356 wrote to memory of 4148 3356 9129837.exe 62 PID 3356 wrote to memory of 4692 3356 9129837.exe 65 PID 3356 wrote to memory of 3744 3356 9129837.exe 66
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:776
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:376
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:792
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2748
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3836
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3924
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3988
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:4068
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4148
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:4692
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4860
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:1356
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4456
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵PID:4276
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:3196
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:2384
-
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider2⤵PID:2412
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1708
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1028
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1144
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1184
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2676
-
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵PID:1060
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1472
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2544
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1580
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1904
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2152
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2200
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2788
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2824
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3388
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\9129837.exe"C:\Windows\9129837.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\abcdefg.bat" "C:\Users\Admin\AppData\Local\Temp\f71d4d6864c51f508020ae23199edc09_JaffaCakes118.exe""3⤵PID:3672
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3476
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:3744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:5056
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2520
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:3784
-
C:\Windows\system32\WerFault.exe"C:\Windows\system32\WerFault.exe" -k -lc NDIS NDIS-20240418-0259.dmp1⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80B
MD53c2c2719c39678a7ef5013eb16b6f6ef
SHA1323dfea7b524e2781dc2a4584a72a22981eee9a0
SHA2569356b2010f4fca9a15ea990821154c5b8a87ffe472741ad089d08c746df218d5
SHA51247174f9a28ab1309b31c71b11742c0d055a3319e485a44d62452a58fc4af67740d8342552862977b51e79da562f90d92d1b9c9dbbb14e7f2369cbe67133ba71c
-
Filesize
38KB
MD5f71d4d6864c51f508020ae23199edc09
SHA1a243989c774dc8daf12c38dde04865ab1fe68736
SHA25670c16904e1e54170c92d3e5b5e5d37091a7dd2a0cd5a1dbf30f25c97833a70cc
SHA512c4d3176487b2ca8a626d296f2955b7d6e5ae96f94ed9dd5c9af9d7f3e2febf624991873f35133ddc8ac3efe6a3ac56af97750c5f0a545b75c5a15009f8db7e72