Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe
-
Size
340KB
-
MD5
2950e8899ea68c1ce21014e1c968064f
-
SHA1
1218a0593e15191f637348515f1acb6b1bf64015
-
SHA256
7b122d09ebc4db4d256771a01ab941cb41e9aae198ded32cf45840545b79f358
-
SHA512
7f980959f4c77164670287bffa653bdbdece1f0a7879c351b78e3abf70668f7927ac6fad6442675b6250b5f6d179f38d8b669856be4d7986ca6afd178f9f08dc
-
SSDEEP
6144:8uulnSo2oAjS88wwDxznbt2NBT8KhWV8xlrYg1fmJCnkMiLyJo0bIkZ:8lTRAsHNnbMdXsilrz+Ck2TIw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4688 flash.exe 820 flash.exe -
resource yara_rule behavioral2/files/0x0009000000023515-10.dat upx behavioral2/memory/4688-18-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/4688-36-0x0000000000400000-0x000000000043E000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3644 set thread context of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 4688 set thread context of 820 4688 flash.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 820 flash.exe 820 flash.exe 820 flash.exe 820 flash.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 820 flash.exe Token: SeDebugPrivilege 820 flash.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 4688 flash.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 3644 wrote to memory of 1044 3644 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 83 PID 1044 wrote to memory of 4688 1044 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 86 PID 1044 wrote to memory of 4688 1044 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 86 PID 1044 wrote to memory of 4688 1044 2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe 86 PID 4688 wrote to memory of 820 4688 flash.exe 87 PID 4688 wrote to memory of 820 4688 flash.exe 87 PID 4688 wrote to memory of 820 4688 flash.exe 87 PID 4688 wrote to memory of 820 4688 flash.exe 87 PID 4688 wrote to memory of 820 4688 flash.exe 87 PID 4688 wrote to memory of 820 4688 flash.exe 87 PID 4688 wrote to memory of 820 4688 flash.exe 87 PID 4688 wrote to memory of 820 4688 flash.exe 87 PID 4688 wrote to memory of 820 4688 flash.exe 87 PID 820 wrote to memory of 3520 820 flash.exe 56 PID 820 wrote to memory of 616 820 flash.exe 5 PID 820 wrote to memory of 672 820 flash.exe 7 PID 820 wrote to memory of 776 820 flash.exe 8 PID 820 wrote to memory of 784 820 flash.exe 9 PID 820 wrote to memory of 792 820 flash.exe 10 PID 820 wrote to memory of 900 820 flash.exe 11 PID 820 wrote to memory of 956 820 flash.exe 12 PID 820 wrote to memory of 336 820 flash.exe 13 PID 820 wrote to memory of 512 820 flash.exe 14 PID 820 wrote to memory of 700 820 flash.exe 15 PID 820 wrote to memory of 892 820 flash.exe 16 PID 820 wrote to memory of 1052 820 flash.exe 17 PID 820 wrote to memory of 1060 820 flash.exe 18 PID 820 wrote to memory of 1144 820 flash.exe 19 PID 820 wrote to memory of 1204 820 flash.exe 20 PID 820 wrote to memory of 1220 820 flash.exe 21 PID 820 wrote to memory of 1240 820 flash.exe 22 PID 820 wrote to memory of 1372 820 flash.exe 23 PID 820 wrote to memory of 1388 820 flash.exe 24 PID 820 wrote to memory of 1428 820 flash.exe 25 PID 820 wrote to memory of 1472 820 flash.exe 26 PID 820 wrote to memory of 1544 820 flash.exe 27 PID 820 wrote to memory of 1584 820 flash.exe 28 PID 820 wrote to memory of 1624 820 flash.exe 29 PID 820 wrote to memory of 1668 820 flash.exe 30 PID 820 wrote to memory of 1744 820 flash.exe 31 PID 820 wrote to memory of 1764 820 flash.exe 32 PID 820 wrote to memory of 1880 820 flash.exe 33 PID 820 wrote to memory of 1888 820 flash.exe 34 PID 820 wrote to memory of 1896 820 flash.exe 35 PID 820 wrote to memory of 2028 820 flash.exe 36 PID 820 wrote to memory of 2104 820 flash.exe 37 PID 820 wrote to memory of 2112 820 flash.exe 38 PID 820 wrote to memory of 2128 820 flash.exe 39 PID 820 wrote to memory of 2256 820 flash.exe 40 PID 820 wrote to memory of 2320 820 flash.exe 41 PID 820 wrote to memory of 2460 820 flash.exe 42 PID 820 wrote to memory of 2480 820 flash.exe 43
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:792
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:336
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:776
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:3148
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3856
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3952
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4060
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:432
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4176
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:1696
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:2452
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵PID:2616
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3196
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵PID:2244
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵PID:1340
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:1804
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4460
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:512
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:892
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1144
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2700
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1372
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2460
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1428
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1584
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1624
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1668
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1880
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1888
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1896
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2028
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2256
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2320
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2852
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2904
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3332
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\2950e8899ea68c1ce21014e1c968064f_JaffaCakes118.exe3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\flash.exe"C:\Users\Admin\AppData\Local\Temp\flash.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\flash.exeC:\Users\Admin\AppData\Local\Temp\flash.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3712
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3760
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:3220
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2304
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD51cb7b3c7508aec952cc6ed90643e18a5
SHA1fb1485a022699dd29b073b42e08735b4e38e598e
SHA25628104557a2334e6f58ea4a26b0912d321dea547c9dadc2a0c7c1f415715715a0
SHA512bacf34108a010e54ffa7b23c6fdb77f132d63c44315d167a5e52d30b10b2b1ab2445c38bcfa00adeee9ebc39582b2d8c18c439d98708abe3531b744b1a86ee58