Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe
-
Size
687KB
-
MD5
297cfffd13c7e3d3926cd12bbcd1230d
-
SHA1
8bdb7df5a4a6747275cbba18867f0cb75c38d885
-
SHA256
2d41e607b68a0969d74933498e0233164b9f3c956a38ba6199e6044e1613ea9b
-
SHA512
9fd42327a2fa6497e51f476bc973da51cd7b13a0950f90813f65a5efb1526d430cf3e0691e543b0826e3a6d31d35087962aff65e37a64caf5ee82c9f78e7588d
-
SSDEEP
12288:9oNj0REt++19BvWzvbM2LJR1+UXV81UXdIF3Z4mxxVjHWlPXGexomQ4/g:9oV1+iY3M2FR1+0e1UXdIQmXCee+2/g
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2260 3.exe 2368 winnutpc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\winnutpc.exe 3.exe File opened for modification C:\Windows\winnutpc.exe 3.exe File created C:\Windows\uninstal.bat 3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2260 3.exe Token: SeDebugPrivilege 2368 winnutpc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 winnutpc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2260 1512 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe 83 PID 1512 wrote to memory of 2260 1512 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe 83 PID 1512 wrote to memory of 2260 1512 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe 83 PID 2368 wrote to memory of 5016 2368 winnutpc.exe 87 PID 2368 wrote to memory of 5016 2368 winnutpc.exe 87 PID 2260 wrote to memory of 1016 2260 3.exe 88 PID 2260 wrote to memory of 1016 2260 3.exe 88 PID 2260 wrote to memory of 1016 2260 3.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:1016
-
-
-
C:\Windows\winnutpc.exeC:\Windows\winnutpc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:5016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
776KB
MD5444a2327626c664b4420db374c75e288
SHA188932a99bf34448a6b8ec23de1820c8aaff210e5
SHA256e6ce4f21eddbc3ee5644d38c6cbdb0b2cb915ad6b1b4689598d636d1bfdd705b
SHA512e9fd6171d0fb282c323cfbe7684c9b81231f45ef33e2aa657a6fb3749d0d50a3cedcafee51b53fa8e567d7aa5090dae39339648d47c9893ad258b12e54ba295a
-
Filesize
150B
MD567e4ea2c3e65d3236c8266b9c116f67f
SHA17e87f925ccd68b2b7c9af9f92e118db1990234f9
SHA2562dff6c390d03870cec06d16fe0191475fb87ad2330b78d03c15e7ff0bed8f00c
SHA5121a3cf0443e932b9b57f32531b3d61c917b9eec19a4ba73336011041e16a0022c5e62b2c768b34a0bdc08ffd75bbaa0338719577001496c9de8a5638420b0a229