Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 12:38
Static task
static1
Behavioral task
behavioral1
Sample
306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe
-
Size
487KB
-
MD5
306760d2c97dabe6bd64a0920cc7bb83
-
SHA1
712e1d1bf52c110952a3fbfcb614b0864eae97ab
-
SHA256
fa5edc960cd8117171cd6e3a16cbbcfa7fb6252bfd2fe498f92ed43f50ab7de8
-
SHA512
12dd29912021228d2d9fba8b3738f136952f01d0320ecf56528de0e88cacf1d53e631616b58a3c42f78a24d0c77e724e21e4de3ccc7bf52873b116586d57c33f
-
SSDEEP
12288:OczJJhqrVPa3V4axl9DRLt0pBf1e51O6H5SV9zFhit:OczJqVS3aaxl7Re9+sXhit
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\Control Panel\International\Geo\Nation 306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3512 server_n.exe 4156 mservice32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2480455240-981575606-1030659066-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\UpdateN = "C:\\Users\\Admin\\AppData\\Roaming\\mservice32.exe" mservice32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe 4156 mservice32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3216 wrote to memory of 3512 3216 306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe 85 PID 3216 wrote to memory of 3512 3216 306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe 85 PID 3216 wrote to memory of 3512 3216 306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe 85 PID 3512 wrote to memory of 4156 3512 server_n.exe 86 PID 3512 wrote to memory of 4156 3512 server_n.exe 86 PID 3512 wrote to memory of 4156 3512 server_n.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\server_n.exe"C:\Users\Admin\AppData\Local\Temp\server_n.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Roaming\mservice32.exe"C:\Users\Admin\AppData\Roaming\mservice32.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
-
C:\Windows\system32\WerFault.exe"C:\Windows\system32\WerFault.exe" -k -lc NDIS NDIS-20240709-1405.dmp1⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
917KB
MD55e848b9fb9375bb0aa52b95ae538fa3c
SHA12e590e81408b7c9af0486e62630eb68464286867
SHA256f75857122e53cded85b5827384a4b769b273c7f2a1c3edd0fcff7ffdb222103b
SHA5122df691e38e450a4251dbe2a6d9d0b8930b0d3ecb163a898f4bcd55f60da019a9a7d7095e6070b9b7206589125a0ac5463a305e427114425be762fe8fa9c39af7