Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe
-
Size
576KB
-
MD5
7db10b02e822f2d9780def115cebfa0d
-
SHA1
8671032b8d9564ffa8d0caa9b55d29c834b3fb55
-
SHA256
b798af732aa481610e61dbd49b7c3fae4af0c945face3031d57d656b9377f52e
-
SHA512
8db66dc5a424785bcfdf9420d5a7548b00a7da14ca37dd4972daec96bb00c724c5356a4cee9b74c9c0ec3355bf80188b527d371f9d6adfd7bbadca35f69a72ae
-
SSDEEP
12288:8mWhND9yJz+b1FcMLmp2ATTSsdxmWhND9yJz+b1FcMLmpG:8mUNJyJqb1FcMap2ATT5rmUNJyJqb1Fl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3ed42fcb = "\u009d\x1c·èmÀÈdè\u009dÑR\x1b~‹çÈ\u008fÛ¢Ö\x01õT+µa¸8\x16\x1b5¥e¬÷›FÆÞÔ\x1e?UÖWn3M\x0e\x1fC¾^¬%lž”m.T½MæÆ=GÔÓ\u00adÞ\u009dŽLÞ\x7f\x14CT³\x03|+å¼^\x06uFg[†«3^Å-#NŸƒ=‡¶ŽýÖ>>]NåŽÕ´Æ\x1f5´u„~þ\x7fæÖ†S\\vô£¾KÓ¶N\x03\u008dk‹öÝwO̳^UEg´>dÎüÎ\u008fæåå\x1bÔô=Í\x1ec^îýs¬§\x13\x7f“¶ý»÷…å<¤~´Ž¾~Ƨ%¯¯v~£†\x0fg|ÿ\v5Vÿ\\\x05Nm'3˵ӕeOï¾ÝµÅFÅCŽÞóÛ\x7fN\\E\x16v57\x0esVÔ%¦mt6\x06\x15{\x1bN.\x13#\x1b" 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3ed42fcb = "\u009d\x1c·èmÀÈdè\u009dÑR\x1b~‹çÈ\u008fÛ¢Ö\x01õT+µa¸8\x16\x1b5¥e¬÷›FÆÞÔ\x1e?UÖWn3M\x0e\x1fC¾^¬%lž”m.T½MæÆ=GÔÓ\u00adÞ\u009dŽLÞ\x7f\x14CT³\x03|+å¼^\x06uFg[†«3^Å-#NŸƒ=‡¶ŽýÖ>>]NåŽÕ´Æ\x1f5´u„~þ\x7fæÖ†S\\vô£¾KÓ¶N\x03\u008dk‹öÝwO̳^UEg´>dÎüÎ\u008fæåå\x1bÔô=Í\x1ec^îýs¬§\x13\x7f“¶ý»÷…å<¤~´Ž¾~Ƨ%¯¯v~£†\x0fg|ÿ\v5Vÿ\\\x05Nm'3˵ӕeOï¾ÝµÅFÅCŽÞóÛ\x7fN\\E\x16v57\x0esVÔ%¦mt6\x06\x15{\x1bN.\x13#\x1b" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe File opened for modification C:\Windows\apppatch\svchost.exe 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe 2828 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2828 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 82 PID 4052 wrote to memory of 2828 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 82 PID 4052 wrote to memory of 2828 4052 7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7db10b02e822f2d9780def115cebfa0d_JaffaCakes118.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
481B
MD5cb97f4dc04da1dc46ed7fb764dc06c95
SHA1e083da5fcbeb88dd6b2ff885b532badbfc8fcefd
SHA2562099808f2f228b341add84f6bc76625ed84f846c8ac8d5b4474994904426892e
SHA512d061355279b4f8af21ef2cbd6c1b61b83315cc993709d59d9bef719528cc54d1e99b7dd885c3f9228399c62fd02ca2b35f0d12888b7e31cfdd884afce075259f
-
Filesize
42KB
MD5193c1399a5ff37c25208ea30e4c2ed94
SHA18af98478fd35592f6a7d430b9ef408bc1a8c585d
SHA256d092c973385c3db6f776295946ea09467d79cffa6e4f2a5d83c60fe69271d151
SHA51286594fcddd9388ddb6302b78aeca19ff42ffe3f76ffd2cdba15a877522246d541e366a4be8e5f0383e607d3d390137753ef162b4e7e173bd471f1c04cfdd4907
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
481B
MD577158a5fe88ae2e9c488fa439bc16f2c
SHA1d8497a0755fabc562b35a0560ec72476d8e2af57
SHA2562b44dcdec965db5b54efd8f39c75325dad58a99ee1804e23d2ddf70c06e55146
SHA51215264c540cf1f9c570392f9f4dbbb66fb22bd3b671dc36937db39f92a04c34ecadaea5ce13103b13e51fc9d3ebbd3f2338cde88de10626cc1f73101302218425
-
Filesize
576KB
MD535cb98f0be6c40bedc7a2e2697c78037
SHA1f851b544c8ea08add50e380f3020f6d52b827b2e
SHA2568b9f9921d2ea04afdad8f09d9a0fbc3e4605d0647f019efd091e0f55295817b1
SHA5129d0d9054d4426b894907e65046017bc080daa357291a1fec3696c2d1a06670e0bc7fc86bd8ff670ed633a8a2f6050e3c69ceafc8b6a557f25e46152174c1c455