Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 17:48
Behavioral task
behavioral1
Sample
fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
fd4a3af3861edfa99ca15c7b6dff39b2
-
SHA1
00cd93349f4ab8a3b5896440e31dc899cd8585b6
-
SHA256
af00e3c4645fac761a47656f84d5c2036307f00bb01a6fc5be008e5839e4a010
-
SHA512
8e447c4c017f3573b7c13b01fa6f2bebcc24ebf7b1ca859fc216b16003b0feec95b21a45906c0d6d180a312a73a9b8c4b0cf9c7db336f3ba8d449a39ba09be4b
-
SSDEEP
12288:BgHD+WWwXwSqYkjyPnV8GH2Yhpgqx+5R9BIPkMj3lH4cLRCUwphVlEAJqn4:BM+WnHMjyPV8o2Yv+YL31/LCtJ+4
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 892 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 672 4304 schtasks.exe 89 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4544 4304 schtasks.exe 89 -
resource yara_rule behavioral2/memory/4784-0-0x0000000000510000-0x000000000063E000-memory.dmp dcrat behavioral2/files/0x0008000000023271-10.dat dcrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1692 taskhostw.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer = "\"C:\\Program Files\\Windows Sidebar\\Gadgets\\explorer.exe\"" fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Recovery\\WindowsRE\\taskhostw.exe\"" fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msedge = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\pwahelper\\msedge.exe\"" fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper\msedge.exe fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper\61a52ddc9dd915470897a065f14eeedfa88f98fd fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe File created C:\Program Files\Windows Sidebar\Gadgets\explorer.exe fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\explorer.exe fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe File created C:\Program Files\Windows Sidebar\Gadgets\7a0fd90576e08807bde2cc57bcf9854bbce05fe3 fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 892 schtasks.exe 672 schtasks.exe 4544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4784 fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe 4784 fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe 4784 fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe 1692 taskhostw.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4784 fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe Token: SeDebugPrivilege 1692 taskhostw.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4784 wrote to memory of 1692 4784 fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe 93 PID 4784 wrote to memory of 1692 4784 fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd4a3af3861edfa99ca15c7b6dff39b2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Recovery\WindowsRE\taskhostw.exe"C:\Recovery\WindowsRE\taskhostw.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Sidebar\Gadgets\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\taskhostw.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:672
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper\msedge.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5fd4a3af3861edfa99ca15c7b6dff39b2
SHA100cd93349f4ab8a3b5896440e31dc899cd8585b6
SHA256af00e3c4645fac761a47656f84d5c2036307f00bb01a6fc5be008e5839e4a010
SHA5128e447c4c017f3573b7c13b01fa6f2bebcc24ebf7b1ca859fc216b16003b0feec95b21a45906c0d6d180a312a73a9b8c4b0cf9c7db336f3ba8d449a39ba09be4b