Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe
-
Size
355KB
-
MD5
fd4caccb6de9adbb2b6624582d4282d7
-
SHA1
83de28b4a64cb2fee5edd6fecfa4b7741ffea625
-
SHA256
ebf789660da5d62ba7e914055336d8e3fbb9b900f63c3162dfb702a30c339379
-
SHA512
66b777414b6f0f382957e49274ea55efedd6076d3a60680e4b35f815f8c51af6467fe308f074bd3eb46f41d7296ca4bc8b545e669c1ace0dedc70449d6037ec0
-
SSDEEP
6144:Z3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:umWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e636359b = "ü=´p\x1cée×è´Sþ½Ox†“âU›šûò—\u0090vÅ™5\x0f\x1aH]\x15oÕŹ·\u008f=µ\x7foßßÿw·\x7f\u008fÿÍgשUåG\x05Ww?Ù\x05iÿµ%׸¡Ÿ¹Ÿ—µÇ¯¿u½WgØX\x19·W‰\x17Õ5…Ç©}€w\u008f§—˜'ÿð¯a\a?\r¡\ao¡ÍHý×QoýQ\x15½]·‰—í¿\x1fI\u00a0\x1déØÅIQ}°\x1dß}8\x17\x0f¿\u00a0ñ%}¹Åým\x1dqQÿ\x1fWÅÁg€•…å=0AgÇ)AÙÇ\u00a0§÷wÕå_½ñ\u009dmG\r\rÕ_¥·`åðÇ G\x10_˜\x1fß\x05Ð%%Ý'Ï×mi}gGÕ]\u009d°}8Ï(\x10åý\u009díßÀU}í}q\u009dÍG‡¥½'•‰¨\x7f\x01Á•Å]÷\x1d\x19" fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e636359b = "ü=´p\x1cée×è´Sþ½Ox†“âU›šûò—\u0090vÅ™5\x0f\x1aH]\x15oÕŹ·\u008f=µ\x7foßßÿw·\x7f\u008fÿÍgשUåG\x05Ww?Ù\x05iÿµ%׸¡Ÿ¹Ÿ—µÇ¯¿u½WgØX\x19·W‰\x17Õ5…Ç©}€w\u008f§—˜'ÿð¯a\a?\r¡\ao¡ÍHý×QoýQ\x15½]·‰—í¿\x1fI\u00a0\x1déØÅIQ}°\x1dß}8\x17\x0f¿\u00a0ñ%}¹Åým\x1dqQÿ\x1fWÅÁg€•…å=0AgÇ)AÙÇ\u00a0§÷wÕå_½ñ\u009dmG\r\rÕ_¥·`åðÇ G\x10_˜\x1fß\x05Ð%%Ý'Ï×mi}gGÕ]\u009d°}8Ï(\x10åý\u009díßÀU}í}q\u009dÍG‡¥½'•‰¨\x7f\x01Á•Å]÷\x1d\x19" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe 4568 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3988 wrote to memory of 4568 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 89 PID 3988 wrote to memory of 4568 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 89 PID 3988 wrote to memory of 4568 3988 fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd4caccb6de9adbb2b6624582d4282d7_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
481B
MD52234a7bfd10044c04bd551760817ddfa
SHA1ccc92459d26f421b3e8ccaf0a4f38d037eaba8e2
SHA25673e0a231867415ce4fd80312b0cf4207f73fa5bc216507a5feede8ab05f44f13
SHA512f7c6d29ea1984df9092d51d3fc9c4b930b66023aefd81164875bf61475835af9b294e622eaa99efc48060cdbe5d943ba29c7c5043687fc47dffee371dc6d590a
-
Filesize
41KB
MD52787c8d1fcc3e942b5dde425413097b4
SHA134bdbd929d1220f3a4f8b383d93e191e2da1ce6d
SHA25606239c1130f7e82a6fbdc6873396f441c176b43711ff0e41e0f90005cd753e23
SHA51265e79aa3b52289ae37ded22e610066ee7ced44f795a2bd8f00fb36b0383c0e0362eb6676ee271d048533eb7516516b7add6f973a377fd03ebada66168a65978f
-
Filesize
355KB
MD58ef4ac7a84690859cfb1a634dd8d1529
SHA1e3ab7a1972aa3d5c3c1748ffb353a4b01c132f24
SHA2566e620e24852bcd3089511c1000507084c9a3135a4be499d420afdeb64b982327
SHA512ea1a94ce35dcca0f8bd3c1344f64fc105e0c150ff3584f2e3f348e54cc8b550b3c977b8d7ab947476ef06e971e47519934fdfe4b9c5cc622bc731ab1848e7081