Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 15:44
Behavioral task
behavioral1
Sample
75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe
-
Size
83KB
-
MD5
75f932924f3c3e008b9d0f7c82aa02e0
-
SHA1
abbc2a5120c9305fb11f0e519f2266cfa83a7fa5
-
SHA256
187b6bf3a3b239dc40fb17b6ddef3e7d72e790cea5b72e589bd7f4c705443e25
-
SHA512
15257631c30d2ba40fee3813fd7ed36e23dcbb3ce3e3e8c005ad3fd0d28ddacd6e263e7c291712803bfaafdc1c6959b84943148727e49fdfe8629efcc46134f7
-
SSDEEP
1536:+AK/Eg7V/tYsadOXWaJ77pE4Y4oICqzZ9uMV/GWUk:JkEgp/tYs3XWaJhfYJ73iFUk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1656-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1656-6-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\10-1-5-112 = "c:\\program files\\Webdialer\\75f932924f3c3e008b9d0f7c82aa0 -m" 75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files\Webdialer\75f932924f3c3e008b9d0f7c82aa0 75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe File opened for modification \??\c:\program files\Webdialer\75f932924f3c3e008b9d0f7c82aa0 75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 668 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1656 75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75f932924f3c3e008b9d0f7c82aa02e0_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1656