Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe
-
Size
17KB
-
MD5
013ae272a8592dc71cf0e365224b4c5f
-
SHA1
07c0c948d1dfdadaf5ca4ad3218321510c3b20e7
-
SHA256
8f1efedc8a775a66d1f48033ce08ad85dd40382b802740a0c9c6be55e3081993
-
SHA512
561c1c3af88f37b72c98012f93cac797df5c0c2149ebf2ba0ff3e93f87038bb5688aa4cf36b60a2cfa303f5398da8d8fc5c2d3f9d1f6008fd1e7a55ed2f8a9dd
-
SSDEEP
384:Xb1YqflUofA8IT+kgPPYtCQ/ZfcyN5Q6gttA0nurPPnyhI:XbuCl5A8I7gYEwfcrJnqChI
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run ishost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\ishost.exe = "ishost.exe" ishost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3856 ishost.exe 1524 ismini.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ismini.exe ishost.exe File created C:\Windows\SysWOW64\components\flx0.dll ishost.exe File created C:\Windows\SysWOW64\ishost.exe 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ishost.exe 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4816 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe 4816 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe 3856 ishost.exe 3856 ishost.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe 1524 ismini.exe 1524 ismini.exe 3856 ishost.exe 3856 ishost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4816 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4816 wrote to memory of 3856 4816 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe 82 PID 4816 wrote to memory of 3856 4816 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe 82 PID 4816 wrote to memory of 3856 4816 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe 82 PID 3856 wrote to memory of 1524 3856 ishost.exe 83 PID 3856 wrote to memory of 1524 3856 ishost.exe 83 PID 3856 wrote to memory of 1524 3856 ishost.exe 83 PID 4816 wrote to memory of 1284 4816 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe 84 PID 4816 wrote to memory of 1284 4816 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe 84 PID 4816 wrote to memory of 1284 4816 013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\013ae272a8592dc71cf0e365224b4c5f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\ishost.exeC:\Windows\system32\ishost.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\ismini.exeC:\Windows\system32\ismini.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\013AE2~1.EXE > nul2⤵PID:1284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5250bc0514768909e6b12c0a8e6673241
SHA1e162b2d21e160a98831239b8d284aa7d701b8979
SHA25627198b8cdcc1afd9a26eac6c23c39575ed65c716d8028ed1e7b87dd3984d0fb1
SHA5127b80b3f2405e9dc1729ce383bcb31e2ad514f9386be5cd2594e98261dde132548e04c632409fe0cc95c37b9bab8db5c43836455fda273dd13857e6402e04ab4d
-
Filesize
4KB
MD535c39fa81fdcff270083aa152b00383c
SHA1fa4349fec827bdb9816e99b42357a532ee5b35f5
SHA256596ef02e8220280a5f62b24ac65701dbfdab4882d916756875ef019f81889c80
SHA512c09736a6da1b1197480ac347fda66ed4b88f74d2888682f1ee89f5129d60ba0cd8c8f4720d2864e36c8b51eb68a2e1205254e7c7ca50481194e23bb9c5befbca