Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
2922f9040088cb86f7d8f13f2ef96bc8
-
SHA1
8403ca7464c6f76a1c61e2b65336baf95e33107b
-
SHA256
1ba42797d3deb98718cc45e2a49820b09a33a3780064fd016c883fd7a1b04e6f
-
SHA512
231f138271273d742298594a77b92dcb7f1d26754338d8326485039d66a7e682b30fcc5dc410ffbc2a8c1a8a1a612740ca62222097af95e89fef7e5bf65adb20
-
SSDEEP
24576:0lKfoV9Ih72HgbL+bBD4yyLWF2+4WzA70fA6IzwJ87g:CvIsOL+bRRfg+qUOM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4236 CHEVRO~1.EXE -
resource yara_rule behavioral2/files/0x0007000000023466-5.dat upx behavioral2/memory/4236-7-0x0000000000400000-0x00000000004D5000-memory.dmp upx behavioral2/memory/4236-11-0x0000000000400000-0x00000000004D5000-memory.dmp upx behavioral2/memory/4236-13-0x0000000000400000-0x00000000004D5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Chevrolet Corvette C5.scr CHEVRO~1.EXE File created C:\Windows\SysWOW64\Chevrolet Corvette C5.scr CHEVRO~1.EXE -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ss3unstl.exe CHEVRO~1.EXE -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\Desktop\ScreenSaveActive = "1" CHEVRO~1.EXE Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\Desktop CHEVRO~1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\CHEVRO~1.SCR" CHEVRO~1.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4236 CHEVRO~1.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1916 wrote to memory of 4236 1916 2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe 82 PID 1916 wrote to memory of 4236 1916 2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe 82 PID 1916 wrote to memory of 4236 1916 2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHEVRO~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHEVRO~1.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
PID:4236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD59297b95c3ca8cb556ee433faa7eb7e80
SHA13a9516a30ca01c24cd45b646d9dd821d93096649
SHA256ed3ef489be3ca9b35a92ecdfe8d015fed2e8a732b1eb0ee74c063ab1c6ae565e
SHA51274a952cb087d5379aab8994fd962e4db6049644092dcf83613cd333d56511305fb8b1dc96a2f194d4e00622b99422fa124f3fd221922b34ff57e8ff6865deef0