Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe
-
Size
274KB
-
MD5
89d3eac86faef84e0a7f65240c9d86d3
-
SHA1
e87c8e8d6e73071cb04b87ea9b83ce917273ea6e
-
SHA256
b9848db860274c4a81c5c3c557d5cd879b4f178017def7bc36f90865251432e7
-
SHA512
b714e1c2e2a7a2fd7f2cda0643bdb1930d3af20aa5acfaf8762a88436fba006fb2d4596b8b55ec90b82048f6fa1eb01fea3b0941251325d0badfaf725d8a2593
-
SSDEEP
3072:ACMXA3meKbSsqtqvEAG+IGpKg8IHQago8KHh/cnUtAOicom/8T914G7gQ23XAF:ACMXlbgG4IHQQ5h/0Uql48T0G7PKQ
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe" 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3368 wrote to memory of 1548 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 85 PID 3368 wrote to memory of 1548 3368 89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe 85 PID 1548 wrote to memory of 4844 1548 csc.exe 87 PID 1548 wrote to memory of 4844 1548 csc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89d3eac86faef84e0a7f65240c9d86d3_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hmsavzsx.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B93.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3B92.tmp"3⤵PID:4844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD560ae77f4e99404f9046cd861451979d9
SHA1b2939c1c389032563a119b7a5716e806caa8a123
SHA256cb2715c6ce9deeab6cdce8bb7fe321ee6e6fb28fa7675803de7823e0be54a823
SHA5121ca1bdb6916dc91bb15edb4610433f42310a394525eb3fb951d188e0066258210a6285d233946afbed3c47e5c550e3418f274003198f89583f3a24a01ad6fd5e
-
Filesize
9KB
MD5d52557669a0a7695236aee6d93c8a82b
SHA1475cbd79116dc583dd6b5e4a980c792e2c6c23a3
SHA25652042dcbbc849e8e66e19a53d0eb3636a08d31746737b6e0155efb1cb15351a3
SHA5129d1ae43f57f9e59b6c8508a026265930803f1fa6b66fbce03ee3ab3ac78ae33a98a237ef9dd45af12e0e3f2aa28235b035d85f7f1b348cfe74b4437571435160
-
Filesize
652B
MD524237e091e5f12964144d35a182deff0
SHA1b4238bec845f600c4509500e02881c3d5ec59460
SHA256e5eb5603787a30241a3a656b1c46cdac1e0290f74de358d3fd32598557bcc6d0
SHA5121fdc83b36b6552b176ab29d2d3ce161e75303ea3092a9e5ce6ce92a1f7d425c18e48acd0a74e52cf4c219a21c5b132e72e81ba9ce1bee5f4744a3b8f83163934
-
Filesize
14KB
MD54f0f95142621eed1777bf774e3a65020
SHA127f96ebd1d5ea9fc89f476a32bf2b87fbc55568f
SHA256041481b11898b0465c4fe6c4caa82fcf9ef02cd66f712bb88b3ff9b20bd8251a
SHA512a69162199c8ed69fb455ef895a2496f57603380842e9d601d665f7aab550316317bb304fb10d21caba41fbc0947941f5e3053b5bf6d753d39d2214b8088a637c
-
Filesize
439B
MD5df452d0e4dae9967e89d0fdac424582f
SHA1a022cc7f399b58a24f3a6cc081b9cb9d8162a5c0
SHA256fa50c4a589750c8647243a4b8e33a7229b3c1cd2a08ffcdc8107a3c0b62cd23f
SHA51230356f49f1aab34c7cac2f8cde4de983f63d81b06e1d81cb3dd919a39c50e42c1d179d0d954022b13412d6206778e86d72929e191c6d3580eefda8a52ce80fdf