Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
1378623c54577c3c86bc3aa614a0917e
-
SHA1
cd6e385e98074837f7e9f0c4bf48402429857408
-
SHA256
18bb890d50e9710a88cd4aee0796c71d3fc9d51ec424040cb00558ae8aab5573
-
SHA512
7994210e6dfa6698f21e2be4f3202aa1b325b8613e2637b02a47a0c86189a13ae1a3dd577b92060a4838011b37ca2e453729960324e593249d8f9a0c1f0d55f4
-
SSDEEP
24576:iQi/T0gH3m4C4kOudJDcPXgejld25qbqLlJXkluJoz3KpTsBNkdSnMBTlP0Qjcpz:i9r0gXm4CgAtcPXyq2pJXkkorkSGpfE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp -
Executes dropped EXE 3 IoCs
pid Process 4828 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 5056 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 748 msnetcore.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 msnetcore.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE msnetcore.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies msnetcore.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 msnetcore.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft.NET\v2.0.507279\is-QQTSE.tmp 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Microsoft.NET\v2.0.507279\msnetcore.exe 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Microsoft.NET\v2.0.507279\msbuild.exe 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Microsoft.NET\v2.0.507279\msnet.exe 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp File created C:\Program Files (x86)\Microsoft.NET\v2.0.507279\is-TR37L.tmp 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp File created C:\Program Files (x86)\Microsoft.NET\v2.0.507279\is-5D3GV.tmp 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp File created C:\Program Files (x86)\Microsoft.NET\v2.0.507279\is-N0EIR.tmp 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
pid Process 3176 taskkill.exe 1528 taskkill.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" msnetcore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" msnetcore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" msnetcore.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" msnetcore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix msnetcore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" msnetcore.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" msnetcore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ msnetcore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5056 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 5056 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 748 msnetcore.exe 748 msnetcore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3176 taskkill.exe Token: SeDebugPrivilege 1528 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5056 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3184 wrote to memory of 4828 3184 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe 83 PID 3184 wrote to memory of 4828 3184 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe 83 PID 3184 wrote to memory of 4828 3184 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe 83 PID 4828 wrote to memory of 1712 4828 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 84 PID 4828 wrote to memory of 1712 4828 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 84 PID 4828 wrote to memory of 1712 4828 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 84 PID 4828 wrote to memory of 3176 4828 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 85 PID 4828 wrote to memory of 3176 4828 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 85 PID 4828 wrote to memory of 3176 4828 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 85 PID 1712 wrote to memory of 5056 1712 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe 87 PID 1712 wrote to memory of 5056 1712 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe 87 PID 1712 wrote to memory of 5056 1712 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe 87 PID 5056 wrote to memory of 1528 5056 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 88 PID 5056 wrote to memory of 1528 5056 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 88 PID 5056 wrote to memory of 1528 5056 1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\is-NM969.tmp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-NM969.tmp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp" /SL5="$80160,1431047,56832,C:\Users\Admin\AppData\Local\Temp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe" /VERYSILENT /SP-3⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\is-1IUOQ.tmp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-1IUOQ.tmp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.tmp" /SL5="$501D2,1431047,56832,C:\Users\Admin\AppData\Local\Temp\1378623c54577c3c86bc3aa614a0917e_JaffaCakes118.exe" /VERYSILENT /SP-4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im msbuild.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im msbuild.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
-
C:\Program Files (x86)\Microsoft.NET\v2.0.507279\msnetcore.exe"C:\Program Files (x86)\Microsoft.NET\v2.0.507279\msnetcore.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259B
MD5f42aa406ed306b8d00ed512de90068ae
SHA1364bee70880dbee1c070c25f95037a4882fcf08d
SHA256195fe5db844cdf13e7ee1e4bae3b0cec6a2b24659b482c42af76cbde59eb8b33
SHA5126ddd5a43e55348290a47dceeacc8821ceef1791c1af6a709f338663f8693b312acd8ceecf0b1b55d2c861d34860777d1728f49381a9a75333904e6f8a87ce012
-
Filesize
3.3MB
MD5fd3fa916884a91bf26c86101900854f6
SHA1124a4242eb33c30146598411f1fa62b3f7c9c05b
SHA256a9c3a00a801e5d3abaaed4c1adf21ea38803f80bc9575651f821323b54372968
SHA51216e46f382f0ae1aff3d6aad04bc464eba261baa29d0b1f0ca0a3c290f23e239cf82485bbc3bcf0baa32b595478ea3fded18532653b3d08bc1e04adb6c28c475c
-
Filesize
691KB
MD59303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3