Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Errors
General
-
Target
2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe
-
Size
752KB
-
MD5
2e525fd12fa205bfcf3e31a2e8cc4a33
-
SHA1
bde0774c70287f199e6e648a273c17d54c6d3c51
-
SHA256
1818b1d5dfe20074745e0ae145c6f0effd36d47cd801a542db671c9d818a1f5e
-
SHA512
10548a293d75c3fe61d0cfe7155f4ae758ebbe3c31f6a4dd6537b211053c55266f9921b933a95084e6a7e9d2bb02354de39ddee09fe8e10ee53c38bc492dd1ad
-
SSDEEP
12288:N//76GGDtNFp7PTzvHq1NNfr2RInBZqpzUF4AnjZnMei/SFfdYTQq5BeXBWV:x/vGDt9TzvHqH5pqtURjZnli5kAwRWV
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rundll32.exe 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe File created C:\Windows\SysWOW64\rundll32.exe 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9245DC5-5679-A46C-7AC6-BA5AF2C3121E}\InprocServer32 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9245DC5-5679-A46C-7AC6-BA5AF2C3121E}\InprocServer32\ = "C:\\Windows\\SysWOW64\\RasDiag.dll" 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9245DC5-5679-A46C-7AC6-BA5AF2C3121E}\InprocServer32\ThreadingModel = "free" 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9245DC5-5679-A46C-7AC6-BA5AF2C3121E} 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B9245DC5-5679-A46C-7AC6-BA5AF2C3121E}\ = "CPPTPDiagHelper Object" 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\TEMP:CF0907B4 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe File opened for modification C:\ProgramData\TEMP:CF0907B4 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe -
Runs .reg file with regedit 1 IoCs
pid Process 4944 regedit.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe Token: 33 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 3240 wrote to memory of 732 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 85 PID 3240 wrote to memory of 732 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 85 PID 3240 wrote to memory of 732 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 85 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 2196 wrote to memory of 3240 2196 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 81 PID 732 wrote to memory of 4944 732 cmd.exe 86 PID 732 wrote to memory of 4944 732 cmd.exe 86 PID 732 wrote to memory of 4944 732 cmd.exe 86 PID 3240 wrote to memory of 5024 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 87 PID 3240 wrote to memory of 5024 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 87 PID 3240 wrote to memory of 5024 3240 2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat3⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- Runs .reg file with regedit
PID:4944
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe 1480 "C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe"3⤵PID:5024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5908860a865f8ed2e14085e35256578dd
SHA17ff5ee35cc7e96a661848eb95a70d0b8d2d78603
SHA256d2b73d92cf00a9dc61f2777a7f298e8c4bb72697236965f8931bdfc9d0924c5f
SHA512a93bb8cb180d957ef2b2c511d5ff66a25d2bcfb071af9884c146b8c422d1fadc9a4d390712bc2cb27640634854b3e59d5209803373cf1f42381d513747a65fd9
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904