Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe
-
Size
135KB
-
MD5
152c3a938d882cf3d145738527311ba7
-
SHA1
fc85bbba67fd830057655eb1991cc78feff25fef
-
SHA256
c331b8bc49216750fe2de51354ce88605afbc4c39ffeaf39b840821f10ac6be6
-
SHA512
852f7d52269ea96d2d0f1cd7b78a4538b2f843df1a26e3c9be79d3535b268e22561a268e8dd797d3db998b53652e4c8cd89a47a686c071ac998a5f1e2c210230
-
SSDEEP
3072:IM3b7Gqm/1UPb1WpXVxAaGBvbNvNbNJkvmhyPQbaDTUXGIDbwKDqCtrwdAxaVTtU:H3b7O/UoIDbByGPMsMP
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" dolef.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation 152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2244 dolef.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dolef = "C:\\Users\\Admin\\dolef.exe" dolef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe 2244 dolef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4476 152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe 2244 dolef.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2244 4476 152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe 89 PID 4476 wrote to memory of 2244 4476 152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe 89 PID 4476 wrote to memory of 2244 4476 152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe 89 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82 PID 2244 wrote to memory of 4476 2244 dolef.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\152c3a938d882cf3d145738527311ba7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\dolef.exe"C:\Users\Admin\dolef.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD501fa51d4e20cf7e62160442a079e8d8c
SHA1572fc4a38adc961b8528b2f575b8e7fff6899c6d
SHA2563bd9ae0b82767dc1c9dd2107a995e68c9522e464e6ce3653607dab4239cf7616
SHA51241d5975f6eeb73118bf4990c1f7911f4741eb0f87eb38621e2c3560b6a4643594ae00a24b18bcc7c427ec1148b9763c2b0a785136f9e7a5c65df8d86cf231046