Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
15a3732e63485462605874e1e279397a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
15a3732e63485462605874e1e279397a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
15a3732e63485462605874e1e279397a_JaffaCakes118.exe
-
Size
413KB
-
MD5
15a3732e63485462605874e1e279397a
-
SHA1
0ade985b167cded4448f006fa03063710897e557
-
SHA256
4ee83e4bac681bfe77f8e76a800985914be180c969c4494478ac2cf331efec39
-
SHA512
9d292d9c7a84d69d864c0f2c70ba20e16bd02078f53cbcd6f3e79bf0379e6d298356d8e9a0b72b1d6b899f536923bfb444d9bfdf4a8343ea337693003a0b71c1
-
SSDEEP
6144:s9Zc0DWKJaUns8OWukRLbXES7YkoLh4en2udAsSJU0eq4lDDhVSGsGZSYDR:q53JVspnkRLYSzo94czdFyU0e9lv5r
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts scansock.exe File opened for modification C:\Windows\system32\drivers\etc\hosts sockhelp32.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 15a3732e63485462605874e1e279397a_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 15a3732e63485462605874e1e279397a_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation scansock.exe -
Executes dropped EXE 2 IoCs
pid Process 3644 scansock.exe 3300 sockhelp32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dnfhack.cy 15a3732e63485462605874e1e279397a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 3644 scansock.exe 3644 scansock.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 3644 scansock.exe 3300 sockhelp32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4132 wrote to memory of 3644 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 80 PID 4132 wrote to memory of 3644 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 80 PID 4132 wrote to memory of 3644 4132 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 80 PID 3644 wrote to memory of 3300 3644 scansock.exe 81 PID 3644 wrote to memory of 3300 3644 scansock.exe 81 PID 3644 wrote to memory of 3300 3644 scansock.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\15a3732e63485462605874e1e279397a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15a3732e63485462605874e1e279397a_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\scansock.exe"C:\Users\Admin\AppData\Local\Temp\scansock.exe"2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\sockhelp32.exe"C:\Users\Admin\AppData\Local\Temp\sockhelp32.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3300
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD515a3732e63485462605874e1e279397a
SHA10ade985b167cded4448f006fa03063710897e557
SHA2564ee83e4bac681bfe77f8e76a800985914be180c969c4494478ac2cf331efec39
SHA5129d292d9c7a84d69d864c0f2c70ba20e16bd02078f53cbcd6f3e79bf0379e6d298356d8e9a0b72b1d6b899f536923bfb444d9bfdf4a8343ea337693003a0b71c1