Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe
-
Size
20KB
-
MD5
2122a171e6197bd8d1aa986dacf033e7
-
SHA1
aa2f603cc0f553d94527c087af91e8805e049206
-
SHA256
3336d0a792b14da9c3249f04be5b2c4c78f36232957d20326c5dec67ba5855d7
-
SHA512
ea8bec085682c6955d46b0d6fe9999e340a5bc85790b6489b7e03816e0e5cc8dfad4b28ec6e9fd0cbc0ae7921869343830daf531565ae4b0c06419dad97ff362
-
SSDEEP
384:+E20kjGwdjuMGaJHDVcNTXkkgl6QUUVrV90Tfi3t5Mn7s1LEFeeHbamXF:+Exk6wdjuaJRcNzkkeUUFV9Yfee8keet
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe rundll32.exe calc.ifo before1main" 2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 3120 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 3008 2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe 3120 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\calc.ifo 2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\calc.ifo 2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\idid svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\idid\idid = "384453393" svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3212 WINWORD.EXE 3212 WINWORD.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3008 2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3212 WINWORD.EXE 3212 WINWORD.EXE 3212 WINWORD.EXE 3212 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3120 3008 2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe 89 PID 3008 wrote to memory of 3120 3008 2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe 89 PID 3008 wrote to memory of 3120 3008 2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2122a171e6197bd8d1aa986dacf033e7_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Deletes itself
- Loads dropped DLL
- Modifies registry class
PID:3120
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD50b124a35686f686c0d80ed6f1c5155de
SHA157783ff5b2ec605ecb2357ea025604de6086557e
SHA256e12a7b8e61de8d43494040de92c8dce6421b92f42bbf92b4b408601f0f87aee2
SHA5124afe56902be0e7896b4e6554ea6c24a62170bbdd98de70f8d1a509b1204abd334d08c5809c7d9eae29edccb057d57d5d751d174f5b81119b22daf8993d53998f