Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe
-
Size
568KB
-
MD5
00d55a0adfb2ee1394ddb368be5c7d24
-
SHA1
42c1ae2858be19c3aaf58f1a5ceff090f092570c
-
SHA256
aab8eaff9af3ac90b28e4e613db329fb6817918ea046c3fe44349ef5a86d4296
-
SHA512
a11c51b17d0a6cad3974dd6f579b40700b2ace608c02cd7d35ab6509be5157ef00ccf46cf623291e93d40b2f91f7761eb79bd6cd8b234fa6da232e0e649badad
-
SSDEEP
6144:SEkNbZcQblOeRpBJ+CGGDKLe8Wiyq+MsbzWqqKUzq7Cm6oB3U6Mcd7yg2FQ6F:SEkNbZHbbz4kKdsbzWqVUzCgQdB2Sq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" svchost.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 320 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 672 svchost.exe 3536 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1312 set thread context of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 672 set thread context of 3536 672 svchost.exe 85 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 4900 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 672 svchost.exe 3536 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1312 wrote to memory of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 1312 wrote to memory of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 1312 wrote to memory of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 1312 wrote to memory of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 1312 wrote to memory of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 1312 wrote to memory of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 1312 wrote to memory of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 1312 wrote to memory of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 1312 wrote to memory of 4900 1312 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 81 PID 4900 wrote to memory of 320 4900 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 82 PID 4900 wrote to memory of 320 4900 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 82 PID 4900 wrote to memory of 320 4900 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 82 PID 4900 wrote to memory of 672 4900 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 83 PID 4900 wrote to memory of 672 4900 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 83 PID 4900 wrote to memory of 672 4900 00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe 83 PID 672 wrote to memory of 3536 672 svchost.exe 85 PID 672 wrote to memory of 3536 672 svchost.exe 85 PID 672 wrote to memory of 3536 672 svchost.exe 85 PID 672 wrote to memory of 3536 672 svchost.exe 85 PID 672 wrote to memory of 3536 672 svchost.exe 85 PID 672 wrote to memory of 3536 672 svchost.exe 85 PID 672 wrote to memory of 3536 672 svchost.exe 85 PID 672 wrote to memory of 3536 672 svchost.exe 85 PID 672 wrote to memory of 3536 672 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svchost.exe" CityScape Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:320
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe/d C:\Users\Admin\AppData\Local\Temp\00d55a0adfb2ee1394ddb368be5c7d24_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
568KB
MD5e409473c2c231c1cf0a5724736c2e344
SHA16fca90418420071f46a9bd4035a1d591439937c4
SHA25652d62d8bab76a8cb853052d4e31f6dcd8c8d17c8a713e960fb970937ae965033
SHA512688e4c21de78d50c11a54ddbf89058e770f0f74fc15a11ae2e446d19b42c77007ee8558460ff11fc58b8e01dde9aad66166df908c31989e9cf619b69ce4ab2c8