Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
22072f995ce54648c2eac2113205914a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22072f995ce54648c2eac2113205914a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
22072f995ce54648c2eac2113205914a_JaffaCakes118.exe
-
Size
403KB
-
MD5
22072f995ce54648c2eac2113205914a
-
SHA1
697290d61f5cae834c7e825c42f91775dbdd555f
-
SHA256
cb2dd254c660e12623ad7df5154945e3f7aefdba062288e0caad5bfa26481552
-
SHA512
bcf49f84da9ce37ca76729be280080e6abdc7d4f8d7dd207cfc8bc9340ca6c49315aec7f3c43d4b67c900584fdf0e787eab869138bcc27f2ccbe0c831d31854f
-
SSDEEP
6144:Pj2rWYaSbUP6Fim96VkyV0iN7D8Q06Kx22h+oly66O/LpFJzOzwZBH:Pj8vaSbhAFVZN7D8Qx52hd5/LpFRVH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2144 nJ01813JfFdD01813.exe -
Executes dropped EXE 1 IoCs
pid Process 2144 nJ01813JfFdD01813.exe -
resource yara_rule behavioral2/memory/632-6-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/632-11-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/2144-20-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/2144-23-0x0000000000400000-0x00000000004CD000-memory.dmp upx behavioral2/memory/2144-30-0x0000000000400000-0x00000000004CD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nJ01813JfFdD01813 = "C:\\ProgramData\\nJ01813JfFdD01813\\nJ01813JfFdD01813.exe" nJ01813JfFdD01813.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1932 632 WerFault.exe 82 5000 2144 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 632 22072f995ce54648c2eac2113205914a_JaffaCakes118.exe 632 22072f995ce54648c2eac2113205914a_JaffaCakes118.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 632 22072f995ce54648c2eac2113205914a_JaffaCakes118.exe Token: SeDebugPrivilege 2144 nJ01813JfFdD01813.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2144 nJ01813JfFdD01813.exe 2144 nJ01813JfFdD01813.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 632 wrote to memory of 2144 632 22072f995ce54648c2eac2113205914a_JaffaCakes118.exe 86 PID 632 wrote to memory of 2144 632 22072f995ce54648c2eac2113205914a_JaffaCakes118.exe 86 PID 632 wrote to memory of 2144 632 22072f995ce54648c2eac2113205914a_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\22072f995ce54648c2eac2113205914a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22072f995ce54648c2eac2113205914a_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 7442⤵
- Program crash
PID:1932
-
-
C:\ProgramData\nJ01813JfFdD01813\nJ01813JfFdD01813.exe"C:\ProgramData\nJ01813JfFdD01813\nJ01813JfFdD01813.exe" "C:\Users\Admin\AppData\Local\Temp\22072f995ce54648c2eac2113205914a_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 7243⤵
- Program crash
PID:5000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 632 -ip 6321⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2144 -ip 21441⤵PID:3912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD5ff5fa60f5ea00ded5507a2cebf061694
SHA1f8ea6172e75382caec70ca59acdd8c987f66f557
SHA25692a9bf26f35f89962e58357a435f322e09bbd487d4c3da28975af85cf9be17ee
SHA512355212252f6749033726a29aace3e32a334916dc1d03c1fa7b092047e3bfcdac6e8164c5618e2a644efa7b6bc0c948674d73487112d052b2a69e0a872bffc8df