Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe
-
Size
910KB
-
MD5
06b245bccd6cdf0e660844aabb58a902
-
SHA1
15e52cbf2967c1f5785385642a64f539ff2258e2
-
SHA256
d94f6bbe9dab952637db64a23a21db3a6858f33b61933692b24fdc2d901ebc5c
-
SHA512
4f4b7ff9b56e6833112558e57fe3e40a368c8cc0fe05adbda86bb076ef1256131d9919e39a02051f87e19cfcce557010bda3dec3746f710574ed2ce05afe6a7d
-
SSDEEP
12288:OJdYY9sTzIFi7ehqem71obL4avRIiZB3XEClFLm4i7ewxa4SzNqQNJBBhR1Pmx/:OjRF7d3UaFLPiwC0JZRsx/
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1964 1.exe 2788 1.exe 2500 1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\1.exe = "C:\\WINDOWS\\1.exe" 1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\1.exe 1.exe File opened for modification C:\WINDOWS\1.exe 1.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 1.exe 1964 1.exe 2788 1.exe 2788 1.exe 2500 1.exe 2500 1.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 656 wrote to memory of 1964 656 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 92 PID 656 wrote to memory of 1964 656 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 92 PID 656 wrote to memory of 1964 656 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 92 PID 1964 wrote to memory of 2788 1964 1.exe 93 PID 1964 wrote to memory of 2788 1964 1.exe 93 PID 1964 wrote to memory of 2788 1964 1.exe 93 PID 656 wrote to memory of 2500 656 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 94 PID 656 wrote to memory of 2500 656 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 94 PID 656 wrote to memory of 2500 656 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\WINDOWS\1.exeC:\WINDOWS\1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
800KB
MD596f8f6776c060d8326d8d006d0a99dd4
SHA1f1c630a8ad5d884a71f1f9b7cedc4d8f7e1d081a
SHA256963d15f2b34fb0299f91e78d08ee82cce554447deea3689911964ab9482b1361
SHA512cb78185e8720f2522e25f51694577b2c6a4fc658aa4afe720d2a1bbbe0e954c7a34e5198f20c060bbdc4b68cb4a253e54b30dd702c2903b06007c2e96b175d21