Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe
-
Size
57KB
-
MD5
fc03b7ec7ca00fd890a7b37e8412b7d6
-
SHA1
e30b0aa70d41971f6bb73fbc4244541bab78435a
-
SHA256
a8d607a3020ce3da9d49de9a1da87142ac0b13fe7552e654f5a94c3b5b8838b7
-
SHA512
b38fa73b801f1f9a52da313d4852cbef4b2a28dcc7c3f8f0de230080f7f9f6a3f8bb536939cb6f23f65ec91178a24969c542f3e8b16d5fe4a0c1814826cef678
-
SSDEEP
1536:0jOyiu5/ab1ygcLV1wnQFi2fBtWYbT7b9fFScc:0CyidxyrwnG5d7b9dK
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\system\Parameters\ServiceDll = "%SystemRoot%\\System32\\hgizgy.dll" fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\system\Parameters\ServiceDll = "%SystemRoot%\\System32\\hgizgy.dll" fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\system\Parameters\ServiceDll = "%SystemRoot%\\System32\\hgizgy.dll" fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2368 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 3480 fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe 2368 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\hgizgy.dll fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe File created C:\Windows\SysWOW64\0005e433.ini fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2368 svchost.exe 2368 svchost.exe 2368 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc03b7ec7ca00fd890a7b37e8412b7d6_JaffaCakes118.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:3480
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k system1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5ab1723c15044cf0bf43f05f9f7ed1fea
SHA15d516f16f04d20eb5e1bb0949fa29a0f350b3331
SHA256437e2f69b2b8f97810377c7d08ac4ec3d59c06314103b0024a0f300513f985f5
SHA512f07d0d1b1f093ffee1d50322ee12c5c6fd84439df31eb277f323cefb27c587a4b9fee0a810c4c142d37b2ba27b8d8e4fd2da849d3353eed0a704171ab1484c86