Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe
-
Size
4.4MB
-
MD5
16e28a3d1acd75a0c572ecca2d700091
-
SHA1
813a8a568bc0f70f0445984d9477d5dcdb691ac9
-
SHA256
104075a9d32f48cf8f38bf1d4f167677956353025742cf44ea1333277510a08b
-
SHA512
fc241a6f6d6c33a81ec655b3b5b6fe3d22e92e69dfa163438a522a6cd35415e1d37ba50a0c0537f8a93dedae56f7515cff3cfab96e1da8f6861303bd085397d8
-
SSDEEP
98304:wzz+XKNcftkb40z9LaIjA9yHtynfDFe2uNgto5ibfdPWjm:w+S4jEyfDSYR2m
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SET98C5.tmp rundll32.exe File created C:\Windows\system32\DRIVERS\SET98C5.tmp rundll32.exe File opened for modification C:\Windows\system32\DRIVERS\EsgScanner.sys rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation EsgInstallerx64Stub.exe -
Executes dropped EXE 2 IoCs
pid Process 2764 EsgInstallerx64Stub.exe 4380 EsgInstallerDelay_1e71bbf294f07658c4881bd2b4e979dc_0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 1 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe -
Drops file in Program Files directory 39 IoCs
description ioc Process File created C:\Program Files\Enigma Software Group\SpyHunter\Spanish.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Brazilian.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter4.com 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter4.exe 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Italian.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\purl.dat 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Danish.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\French.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Chinese(Simplified).lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Romanian.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Finnish.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Lithuanian.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Norwegian.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Russian.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Chinese(Traditional).lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Indonesian.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\native.exe 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\ShScanner.dll 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\SH4Service.exe 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Dutch.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Croatian.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Polish.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File opened for modification C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter4.com 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\defs\def.dat 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Defman.dll 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\esgiguard.sys 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Swedish.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Slovene.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Common.dll 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\EsgScanner.inf 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Czech.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\German.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Portuguese.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Japanese.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\ExecutionGuard.dll 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\EsgScanner.sys 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\English.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\Greek.lng 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe File created C:\Program Files\Enigma Software Group\SpyHunter\license.txt 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2268 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeShutdownPrivilege 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe Token: SeBackupPrivilege 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe Token: SeRestorePrivilege 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe Token: SeDebugPrivilege 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3664 wrote to memory of 3812 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 96 PID 3664 wrote to memory of 3812 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 96 PID 3664 wrote to memory of 2764 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 98 PID 3664 wrote to memory of 2764 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 98 PID 2764 wrote to memory of 3412 2764 EsgInstallerx64Stub.exe 101 PID 2764 wrote to memory of 3412 2764 EsgInstallerx64Stub.exe 101 PID 3412 wrote to memory of 1640 3412 rundll32.exe 102 PID 3412 wrote to memory of 1640 3412 rundll32.exe 102 PID 1640 wrote to memory of 4624 1640 runonce.exe 103 PID 1640 wrote to memory of 4624 1640 runonce.exe 103 PID 3664 wrote to memory of 2268 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 104 PID 3664 wrote to memory of 2268 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 104 PID 3664 wrote to memory of 4380 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 106 PID 3664 wrote to memory of 4380 3664 16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16e28a3d1acd75a0c572ecca2d700091_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /tn SpyHunter4Startup /rl highest /sc ONLOGON /tr "\"C:\Program Files\Enigma Software Group\SpyHunter\Spyhunter4.exe\" /s" /f2⤵
- Creates scheduled task(s)
PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\EsgInstallerx64Stub.exeC:\Users\Admin\AppData\Local\Temp\EsgInstallerx64Stub.exe -inf DefaultInstall -if "C:\Program Files\Enigma Software Group\SpyHunter\EsgScanner.inf" -wait -12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" setupapi,InstallHinfSection DefaultInstall 132 C:\Program Files\Enigma Software Group\SpyHunter\EsgScanner.inf3⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r4⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o5⤵PID:4624
-
-
-
-
-
C:\Windows\System32\sc.exeC:\Windows\System32\sc.exe create "SpyHunter 4 Service" binPath= "\"C:\Program Files\Enigma Software Group\SpyHunter\Sh4Service.exe\"" DisplayName= "SpyHunter4 Service" start= auto2⤵
- Launches sc.exe
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\EsgInstallerDelay_1e71bbf294f07658c4881bd2b4e979dc_0.exeC:\Users\Admin\AppData\Local\Temp\EsgInstallerDelay_1e71bbf294f07658c4881bd2b4e979dc_0.exe -exec CV4P+xygvPOFO/dCO2afl9/Gv0h/j7gpYm2O1knUWcBdGKgfSuDvRodBjRP7CVV4wTwHsG7aBWO7Qbn/v2X3Pg== -args yxLBkkwK+tN/g/lTFU7okMk01a8t+L6jhnEHJZP5MeU= -wait 3002⤵
- Executes dropped EXE
PID:4380
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b502b976d57fe85434ac93528ac27b05
SHA11bdf21314ff4d161e608067acbb6407e33c2edc3
SHA2563b83918e5c5f069885b5be95d89fad6d964aec68a70f8717bcbee88f7fca177e
SHA512e1bb2a1d236fd895dc0966c08a664fccf4c5794d7f07ea9b6fa77b0ad7a0bb42e1eb43aa0ba07f3b63f789c1939fa15266b3b830726924c4f39fee2fd2b9f891
-
Filesize
9.6MB
MD53762cdf8e0c1429c47028679dd2bbf89
SHA1fc6b12ddda4e52f21c65ca748dd26e01be193e98
SHA256e8a33d753a0804a335f1ef49588c7e5433f18f4926464a00bea27ce9344c6c3b
SHA5129a9ceb887139610202d440926ad4a974508936d3d7a81e6ab6936b3582aced806b76e0fa2e39e243379254a1f236fda2dd5d0f144e4516d4d74371be30ccbe7b
-
Filesize
215KB
MD519b67ab7591a2dc79ccf9ec2160e3c4c
SHA15f6716a8772fc8b36d37f1829031edd9062f36a2
SHA256a59ad588e91e7d40ad57af3aa41d32341c1c6cf2e2eff614802f103b67941595
SHA51275795c10aa25b0fb9c2a07fec4e73a457b0956aef95587303b49ed0a9422f1c22637fc80439adc1798fd9a728107fc6854634cfd0d6e5ea98309cbf8ad6a806c
-
Filesize
156KB
MD53aa22e5e51d9a1d0bf0975d08f9f0c0d
SHA1e8af46664bb81ccae93a2fa65889f820c76d016a
SHA256e905047af9613f9122ad0585c5845dd87a375616eb13ebb61b7f5ac5b6503618
SHA512a8c5ec9512ceb4c9a34656366ad284558cf6382bcaa792a73dc41687e6aa9c88d23296d768fa7d0918bdd280ba463e3b031b80cf71cb57d6acb9fab8266a5f4b
-
Filesize
22KB
MD53b32caa07d672f8a2e0df5cb3a873f45
SHA1d61c97fe35649c01280291dda96e6b0df74da492
SHA25609687e30fa5779c3593769d66caebed95c932746edd6e83dabe3dcfd126ab5ec
SHA5121ac0e91eff28a7587acc2ab73cd8b513260acdc2e53b9531f4cabb2b92a1d487ed42edb24c5c6319b2e467c98ccb8697d51653c4cadcb27a256249e2bb48aace