Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe
-
Size
317KB
-
MD5
2e38d3e24043a384dde81ec0bd90165c
-
SHA1
404eb37f4911f31b4c3acc80476d46149c43e99e
-
SHA256
931cd4663a26b8a9259d22c398436be1da8238e2187a4a89cc29a46e28876c83
-
SHA512
429ada61315c45902e7cec60e9eb640ccfc81895bc7309711080a944e15561b1e09e29073885f0ddb6bc801de3335ea3e29eed2c0ec2b32271d938274911c4cc
-
SSDEEP
6144:jgvB8U3GLsvCjuVwg6ndXmgjGNUYYAleJGWS4blVJRsjTMEjN2ndh:jsqsUuVYndXm6ntAezS+RsjYv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 736 nNgNmJd06510.exe -
Executes dropped EXE 1 IoCs
pid Process 736 nNgNmJd06510.exe -
resource yara_rule behavioral2/memory/2620-2-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2620-3-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2620-5-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/736-18-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2620-21-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/736-22-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/736-34-0x0000000000400000-0x00000000004B4000-memory.dmp upx behavioral2/memory/2620-41-0x0000000000400000-0x00000000004B4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nNgNmJd06510 = "C:\\ProgramData\\nNgNmJd06510\\nNgNmJd06510.exe" nNgNmJd06510.exe -
Program crash 26 IoCs
pid pid_target Process procid_target 4272 2620 WerFault.exe 81 884 2620 WerFault.exe 81 224 736 WerFault.exe 85 1988 736 WerFault.exe 85 1432 2620 WerFault.exe 81 4176 736 WerFault.exe 85 1492 2620 WerFault.exe 81 3096 736 WerFault.exe 85 3640 2620 WerFault.exe 81 4856 736 WerFault.exe 85 3680 2620 WerFault.exe 81 1500 736 WerFault.exe 85 2304 2620 WerFault.exe 81 3004 736 WerFault.exe 85 2964 736 WerFault.exe 85 4876 736 WerFault.exe 85 1180 736 WerFault.exe 85 4576 736 WerFault.exe 85 720 736 WerFault.exe 85 4624 736 WerFault.exe 85 952 736 WerFault.exe 85 4536 736 WerFault.exe 85 4936 2620 WerFault.exe 81 4908 2620 WerFault.exe 81 4848 736 WerFault.exe 85 1536 736 WerFault.exe 85 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2620 2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe Token: SeDebugPrivilege 736 nNgNmJd06510.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 736 nNgNmJd06510.exe 736 nNgNmJd06510.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 736 nNgNmJd06510.exe 736 nNgNmJd06510.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 736 nNgNmJd06510.exe 736 nNgNmJd06510.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2620 wrote to memory of 736 2620 2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe 85 PID 2620 wrote to memory of 736 2620 2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe 85 PID 2620 wrote to memory of 736 2620 2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\ProgramData\nNgNmJd06510\nNgNmJd06510.exe"C:\ProgramData\nNgNmJd06510\nNgNmJd06510.exe" "C:\Users\Admin\AppData\Local\Temp\2e38d3e24043a384dde81ec0bd90165c_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 7683⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 7763⤵
- Program crash
PID:1988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 7763⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 8003⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 9203⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 9923⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 11403⤵
- Program crash
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 9883⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 13963⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 16083⤵
- Program crash
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 6443⤵
- Program crash
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 15963⤵
- Program crash
PID:720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 16403⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 17963⤵
- Program crash
PID:952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 18043⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 6403⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 7923⤵
- Program crash
PID:1536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 6242⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 7922⤵
- Program crash
PID:884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 8002⤵
- Program crash
PID:1432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 8002⤵
- Program crash
PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 8242⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 10002⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 10362⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 6442⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 1402⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2620 -ip 26201⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 736 -ip 7361⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2620 -ip 26201⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 736 -ip 7361⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2620 -ip 26201⤵PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 736 -ip 7361⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2620 -ip 26201⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 736 -ip 7361⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2620 -ip 26201⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 736 -ip 7361⤵PID:3268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2620 -ip 26201⤵PID:824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 736 -ip 7361⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2620 -ip 26201⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 736 -ip 7361⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 736 -ip 7361⤵PID:644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 736 -ip 7361⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 736 -ip 7361⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 736 -ip 7361⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 736 -ip 7361⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 736 -ip 7361⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 736 -ip 7361⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 736 -ip 7361⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2620 -ip 26201⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 2620 -ip 26201⤵PID:3256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 736 -ip 7361⤵PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 736 -ip 7361⤵PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
317KB
MD5148fbd64d1596c10a1915dc3c99d529d
SHA1dbaecb1e112d7b79972908d07c1b2784e89f104f
SHA25647e551260f7955c86b8673d1279d6a48045e4bf12f539749846ec039a0c1fe9e
SHA51239a731385d67786913531bf60eb73da1cc153e125d3b5d8d0f8b0167980e36d6a599a90bab0be1901949e5e67f2448a1d275a4d4af9b1ae0632781ca304c229a