Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe
-
Size
161KB
-
MD5
fdd35025d303363a1a51b4baef1a3ca7
-
SHA1
eb082f5ac48b5364a6822c282f21e5d9ffcc9c6e
-
SHA256
eadf6bdd0931c2489b356ae6311f095dcf2b11858ca6d663f97499cf5c259116
-
SHA512
2c8df353b77eadc28af5b0399253db43a9697f379eeaff990a1866df66519d5957a559796fd916d3ce7da8fb4908c31246a15062e4a9e1b2aceafd33e20df36e
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8O:o68i3odBiTl2+TCU/k
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4084619521-2220719027-1909462854-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon14.ico fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\bugMAKER.bat fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon5.ico fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon6.ico fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon7.ico fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon12.ico fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon3.ico fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon10.ico fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\winhash_up.exez fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File opened for modification C:\Windows\winhash_up.exez fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\winhash_up.exe fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe File created C:\Windows\SHARE_TEMP\Icon2.ico fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 808 cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4436 wrote to memory of 808 4436 fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe 86 PID 4436 wrote to memory of 808 4436 fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe 86 PID 4436 wrote to memory of 808 4436 fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdd35025d303363a1a51b4baef1a3ca7_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90B
MD50fb68de4ae2dcbd200cda3a985138b24
SHA191c20f33ee98f025fd27cf7c3543ed928ded4e26
SHA2567e78eddcd57eee22bd68a36ebeaf8b3d62a4dad6020d31e165663e582c145ccc
SHA512009dda03ef1be1b18f81a84388d24b7f7cfe96c5388daa1cdc54b512bdebd5ab5eb7b9097a479ec22f2f86b7db2b4979c21d1e448aaa316af3c760fbe8a706e6