Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 03:16
Static task
static1
Behavioral task
behavioral1
Sample
61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe
-
Size
482KB
-
MD5
61dc0c1453543714395c5afac10c02cb
-
SHA1
e3688921c54a532e14019abd1d5610ed93a507ae
-
SHA256
ed11f0001b22186152323f70938a5a21381b163818a7b27c815cc4b0ea90a61b
-
SHA512
3f73041faba41966391f376e0debcca65f864c9b7d46016d759a39074c46b42dca7d025841f2d07ae8b3ab88bc96e6265859baf8f3468792a2a69423e538222a
-
SSDEEP
12288:gCQSnwxCzWzeHK8kx4xWg0X+z+4pVHWx2Rlk4IT6g:gCQSqCiOkqxWwhHWxuleT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsSystemUpdate = "\\Windows\\SystemWindows.exe" 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsSystemUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\SystemWindows.exe" 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2680 set thread context of 4744 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 93 PID 4148 set thread context of 2856 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 101 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\SystemWindows.exe 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5052 PING.EXE -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe Token: SeDebugPrivilege 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe Token: SeDebugPrivilege 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe Token: SeDebugPrivilege 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe Token: 33 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe Token: SeIncBasePriorityPrivilege 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2856 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2680 wrote to memory of 4744 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 93 PID 2680 wrote to memory of 4744 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 93 PID 2680 wrote to memory of 4744 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 93 PID 2680 wrote to memory of 4744 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 93 PID 2680 wrote to memory of 4744 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 93 PID 2680 wrote to memory of 4744 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 93 PID 2680 wrote to memory of 4744 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 93 PID 2680 wrote to memory of 4744 2680 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 93 PID 4744 wrote to memory of 4148 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 97 PID 4744 wrote to memory of 4148 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 97 PID 4744 wrote to memory of 4148 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 97 PID 4744 wrote to memory of 2136 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 98 PID 4744 wrote to memory of 2136 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 98 PID 4744 wrote to memory of 2136 4744 61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe 98 PID 2136 wrote to memory of 5052 2136 cmd.exe 100 PID 2136 wrote to memory of 5052 2136 cmd.exe 100 PID 2136 wrote to memory of 5052 2136 cmd.exe 100 PID 4148 wrote to memory of 2856 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 101 PID 4148 wrote to memory of 2856 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 101 PID 4148 wrote to memory of 2856 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 101 PID 4148 wrote to memory of 2856 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 101 PID 4148 wrote to memory of 2856 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 101 PID 4148 wrote to memory of 2856 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 101 PID 4148 wrote to memory of 2856 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 101 PID 4148 wrote to memory of 2856 4148 61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_jaffacakes118\61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_jaffacakes118\61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_jaffacakes118\61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_jaffacakes118\61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_JaffaCakes118.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:5052
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe.log
Filesize1KB
MD56809c316af59007886ea5b3420fbef95
SHA14fef6d9eb76cab011863151e59bf624dcb659446
SHA2568e1e00a80229ba89bc9cfcdcc8123f78ce780c983138f1b95cae9112df095105
SHA512d67c763a8c8bd45f8af6c1d83b55433777803ca1fa9fe379055d38d93ce3b057ef622df87dc3f5466783fe7c394416307205775809b39ed33fd92fe0af4cdee0
-
C:\Users\Admin\AppData\Local\Temp\61dc0c1453543714395c5afac10c02cb_jaffacakes118\61dc0c1453543714395c5afac10c02cb_jaffacakes118.exe
Filesize482KB
MD561dc0c1453543714395c5afac10c02cb
SHA1e3688921c54a532e14019abd1d5610ed93a507ae
SHA256ed11f0001b22186152323f70938a5a21381b163818a7b27c815cc4b0ea90a61b
SHA5123f73041faba41966391f376e0debcca65f864c9b7d46016d759a39074c46b42dca7d025841f2d07ae8b3ab88bc96e6265859baf8f3468792a2a69423e538222a
-
Filesize
56B
MD5a3fb02f2aface84e270d7e4b957405cc
SHA165c3334253de9f120460e3e52960be36d9479849
SHA25626d429a3a73a7ee8eca3e953d3ceb7a3aa5f6275e6fcb649affb9f4e2229656d
SHA512d80e9b2ba3b70015870ad56665c1a04071ccff0053e595ba48a1bd674cee15c0e4b3f326035aad81ce9d5378918467274951455fc1d93100df4231f126a179cd