Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe
-
Size
355KB
-
MD5
2b1cbf7abb91b887bac61e733f59e6f0
-
SHA1
75df7706b1d406452c0cb3f2bca6f94febbfa9d1
-
SHA256
6fc446a95e46c797323abf68cca9c719e0d4dc20f8cf10e3bc52e0c22c20510f
-
SHA512
56ec4707585f7805e4f6f42317cd42aee5efd9c63059aeec649c5c8504f2e0315779b08502d952aebd901f533570d18e8e2c761f7bcb01a0aace0f061a843bbc
-
SSDEEP
6144:33EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:EmWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4820 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5778730b = "H‡ºAòõ7š\x14Öot;þ£¼g¾\x06ñ8\u00a0 \x1bÁ\u00a0úû+sþU–Ë•ž#…ý–“+†æ³Û\x05[K“ö^\x03«\u008dÕîÅîÞ3[=\x1b“ƒ½þÓž¥–s•N}V‹\x03Õûe\x1e\vûc\x15^[~Æn“¾]=&¾\x03µã£\x0e\x1b6›ý6³\x1eU\u00adÛÕuÆû‹¥\x1e&Fõõ«+MË»Ë^\x1d\x05û\x1bæÅ5ön\x03›í+……ý;¦\x16Û¥c\x16e\x1e\x1d&Ë\x1dÃFý\v«^\v\x13fÞ‹U%Ń\x03F-†&Å^Å6\x06&†Ý\x03ƒö\u009d3æ†æF®Ëm5ÞÆf¦Vµ6Åë»e†Å.\x05¦õóÅC…~eÆæ\vþk%õíó“C\x1dÕfÝÕUë}†5õnk\x15•&\x1eu~^e\x06ý%\u00ad" 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5778730b = "H‡ºAòõ7š\x14Öot;þ£¼g¾\x06ñ8\u00a0 \x1bÁ\u00a0úû+sþU–Ë•ž#…ý–“+†æ³Û\x05[K“ö^\x03«\u008dÕîÅîÞ3[=\x1b“ƒ½þÓž¥–s•N}V‹\x03Õûe\x1e\vûc\x15^[~Æn“¾]=&¾\x03µã£\x0e\x1b6›ý6³\x1eU\u00adÛÕuÆû‹¥\x1e&Fõõ«+MË»Ë^\x1d\x05û\x1bæÅ5ön\x03›í+……ý;¦\x16Û¥c\x16e\x1e\x1d&Ë\x1dÃFý\v«^\v\x13fÞ‹U%Ń\x03F-†&Å^Å6\x06&†Ý\x03ƒö\u009d3æ†æF®Ëm5ÞÆf¦Vµ6Åë»e†Å.\x05¦õóÅC…~eÆæ\vþk%õíó“C\x1dÕfÝÕUë}†5õnk\x15•&\x1eu~^e\x06ý%\u00ad" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3876 wrote to memory of 4820 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 89 PID 3876 wrote to memory of 4820 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 89 PID 3876 wrote to memory of 4820 3876 2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b1cbf7abb91b887bac61e733f59e6f0_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1280,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=3744 /prefetch:81⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
457B
MD527d3ea64ef0f44f8002f175950e3dedf
SHA145664f15cc95011360e6e0742ca70ca4443737c2
SHA256e06beacdcc1ad1cfbe80aadb8a62d04c80c45e0e603c63b2e4313bfc32b7f50c
SHA51224eff55499cfcfcad8ec8df6e7648b0f16cb2663b5f7d35d1a77caf8f5c5c08a4ad7eda6752113ecca448704e88d38035c43b77f48487954aae3d0ba607365bb
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
1KB
MD5c290d8a0aaaebca6aee742113d9fe083
SHA17ae11ccaf764991416b2ea7033477ff578d5fcb8
SHA2562e91a57bb66adf063a8699a87131446268e955e8629c403209aebc7cebf009ea
SHA5127a5daad621680c887879779c58cee0251c2909d057aa27231b3276391e5d28ddfd3b97d1444ab90ff4ba3b76918f594f827083e5dbc6b2574e32ae89cdf07ade
-
Filesize
42KB
MD5f97af9991b30b51fffbf9bd1c6348b2c
SHA18760c33baa9efaa2dfb32ff028493ce14eedfabb
SHA25652be7a7717b67696251ebd50b68835949bcf198529881ff813a6f3a973784379
SHA512d5ada0240d79d4f51b114da51c4e3439501ed90038593163a7081f737e46f26b3a1976c86d09fad1a68744768910c5cd3c41a876541036f455026bcb1b4104b3
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
1KB
MD5e95953c22bcfeab4cdba03e90b2c8c42
SHA1c7f0d2fe5b9e39670621c6bcdd5a329c351b534d
SHA25625664467b419ad01beb0b54c79b4eafd98beef325b92bde2745316e63bc9141c
SHA5125f892a82b318cdfe4a6dcd19c40f72e54f2124f6e0182787c55eea44c4dc9bd7a11b88c70031f8f462b03969e05209ca5e66d53d6f74d9c50b956fc40ddacbcc
-
Filesize
355KB
MD5cbf7bc056528333dd71d77b7313c609a
SHA189540bd791a240e1a724e8cd3b8ffb3122a29288
SHA2565a6c1d13915384d5b0c3f5e976d3f5c6f99b2348c711127a27404d03c831aff4
SHA512dc29f6026f0abb234f8274cf2ab15107a6045f6c566803d6afddaa9d066f37248ae5b7e39041f5e669c5a562d3aebc4f7e4719df3277369aa751e155e4e78859