Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe
-
Size
32KB
-
MD5
249a0a3a9754d9135d82fef8e484bb82
-
SHA1
fa7606c6e6c6207fe64f792234b6531fd056a066
-
SHA256
ce23c2cf4d6bb1fced1f853415decaecedc9d375b98a4c0de85c8cf3a7cc139c
-
SHA512
f420a5969035c52fda884849749f33eb35547f17cd7525e1872270cbfae3434598a0788b778e9c227ddb93b9d6199718f9240278323b330d4f96939faa00d7ca
-
SSDEEP
384:tWNtx2tdRBOmtqKQq1UW1+jUN/PwyL7rmMBQEQDdim5LtCYPHYqzN50gYPkZo:tWN2tjrtks9tQpimJ74qix
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\mW[íµˆÖ¾`=µú¾˜v%S8’ÿÙêé>grl>Ý\†Ð=ŸàÛ±Þ reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\c:\program files (x86)\bcd_installed.exe = "c:\\program files (x86)\\bcd_installed.exe:*:Enabled:Windows Application Service" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation bcd_installed.exe -
Executes dropped EXE 1 IoCs
pid Process 4268 bcd_installed.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created \??\c:\program files (x86)\bcd_installed.exe 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\bcd_installed.exe 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 2 IoCs
pid Process 1940 reg.exe 1868 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3532 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 4268 bcd_installed.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3532 wrote to memory of 4268 3532 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 82 PID 3532 wrote to memory of 4268 3532 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 82 PID 3532 wrote to memory of 4268 3532 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 82 PID 4268 wrote to memory of 3076 4268 bcd_installed.exe 83 PID 4268 wrote to memory of 3076 4268 bcd_installed.exe 83 PID 4268 wrote to memory of 3076 4268 bcd_installed.exe 83 PID 4268 wrote to memory of 3108 4268 bcd_installed.exe 84 PID 4268 wrote to memory of 3108 4268 bcd_installed.exe 84 PID 4268 wrote to memory of 3108 4268 bcd_installed.exe 84 PID 3108 wrote to memory of 1940 3108 cmd.exe 87 PID 3108 wrote to memory of 1940 3108 cmd.exe 87 PID 3108 wrote to memory of 1940 3108 cmd.exe 87 PID 3076 wrote to memory of 1868 3076 cmd.exe 88 PID 3076 wrote to memory of 1868 3076 cmd.exe 88 PID 3076 wrote to memory of 1868 3076 cmd.exe 88 PID 3532 wrote to memory of 1672 3532 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 90 PID 3532 wrote to memory of 1672 3532 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 90 PID 3532 wrote to memory of 1672 3532 249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\249a0a3a9754d9135d82fef8e484bb82_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3532 -
\??\c:\program files (x86)\bcd_installed.exe"c:\program files (x86)\bcd_installed.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "mW[íµˆÖ¾`=µú¾˜v%S8’ ÿÙêé>grl>Ý\†Ð=ŸàÛ±Þ3⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "mW[íµˆÖ¾`=µú¾˜v%S8’ÿÙêé>grl>Ý\†Ð=ŸàÛ±Þ4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "c:\program files (x86)\bcd_installed.exe" /t REG_SZ /d "c:\program files (x86)\bcd_installed.exe:*:Enabled:Windows Application Service" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "c:\program files (x86)\bcd_installed.exe" /t REG_SZ /d "c:\program files (x86)\bcd_installed.exe:*:Enabled:Windows Application Service" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1940
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\melt1.bat2⤵PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5249a0a3a9754d9135d82fef8e484bb82
SHA1fa7606c6e6c6207fe64f792234b6531fd056a066
SHA256ce23c2cf4d6bb1fced1f853415decaecedc9d375b98a4c0de85c8cf3a7cc139c
SHA512f420a5969035c52fda884849749f33eb35547f17cd7525e1872270cbfae3434598a0788b778e9c227ddb93b9d6199718f9240278323b330d4f96939faa00d7ca
-
Filesize
1KB
MD5ef4b50fda083a1430875eb15fe1792da
SHA1e6ee167f1485504f805e0c7925e89cb7b757ac0b
SHA2562f8ae9d74247556d11337c80722f64334e3f828a45f67df3dfab6de06e604fe9
SHA512207b09632d69093d1ef7b8ef0486296b4a53baa34bdaba811f2be99ee5388d375a5f7681de1e4299323cc50125b5576be210580b8c250196e7bc00682aa92d7e
-
Filesize
254B
MD5f2e38a83a51c7643e998c67be78610a6
SHA1b78208980fb662f7863242e395c9e17a25383722
SHA256773dee9687f17059e5ab111d5684b5e72b0c09d6de940d60eebaa2fe1f3127f4
SHA512190a1191c728bae8c678f2a6f3e9e70b434f95a2935563fe2467541175dcbd8af89c7aabf6bc9e3523cb35a9b5f96cdad16f80c93fbe148fa4d6541e793b68cd