Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe
-
Size
692KB
-
MD5
341b77aef07a6db7a0a4435d14f116fe
-
SHA1
8aa6a8878963ee3cf88a0dcd4b6c319f4dd41935
-
SHA256
4052813833a832623f0954f57ddc69290c9444ad1d58fb634531dc36dc3bb92c
-
SHA512
37e83bfe6fe0e12984e8caf8dc4ec16f27e623c1734a2530608725cc39227f0fece374471144a40d24b7ec6529b71fb44858806169b619b46bc0453501c649d1
-
SSDEEP
12288:yYhVRuOgn9xe/ZYjQ8Sme0uAnGj97gLfjYnIqZJ9XaXCIdjLaxWQnM82:3R4n9xs2c0Nw0XxqZzQpxeA
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run audioadg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audioadg.exe" audioadg.exe -
Executes dropped EXE 3 IoCs
pid Process 4452 audioadg.exe 748 Wmiprwsd.exe 2076 Wmiprwsd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audioadg.exe" audioadg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4280 set thread context of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 748 set thread context of 2076 748 Wmiprwsd.exe 89 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 748 Wmiprwsd.exe 4452 audioadg.exe 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 4452 audioadg.exe 748 Wmiprwsd.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeDebugPrivilege 4452 audioadg.exe Token: SeIncreaseQuotaPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeSecurityPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeLoadDriverPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeSystemProfilePrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeSystemtimePrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeBackupPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeRestorePrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeShutdownPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeDebugPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeUndockPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeManageVolumePrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeImpersonatePrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: 33 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: 34 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: 35 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: 36 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe Token: SeDebugPrivilege 748 Wmiprwsd.exe Token: SeIncreaseQuotaPrivilege 2076 Wmiprwsd.exe Token: SeSecurityPrivilege 2076 Wmiprwsd.exe Token: SeTakeOwnershipPrivilege 2076 Wmiprwsd.exe Token: SeLoadDriverPrivilege 2076 Wmiprwsd.exe Token: SeSystemProfilePrivilege 2076 Wmiprwsd.exe Token: SeSystemtimePrivilege 2076 Wmiprwsd.exe Token: SeProfSingleProcessPrivilege 2076 Wmiprwsd.exe Token: SeIncBasePriorityPrivilege 2076 Wmiprwsd.exe Token: SeCreatePagefilePrivilege 2076 Wmiprwsd.exe Token: SeBackupPrivilege 2076 Wmiprwsd.exe Token: SeRestorePrivilege 2076 Wmiprwsd.exe Token: SeShutdownPrivilege 2076 Wmiprwsd.exe Token: SeDebugPrivilege 2076 Wmiprwsd.exe Token: SeSystemEnvironmentPrivilege 2076 Wmiprwsd.exe Token: SeChangeNotifyPrivilege 2076 Wmiprwsd.exe Token: SeRemoteShutdownPrivilege 2076 Wmiprwsd.exe Token: SeUndockPrivilege 2076 Wmiprwsd.exe Token: SeManageVolumePrivilege 2076 Wmiprwsd.exe Token: SeImpersonatePrivilege 2076 Wmiprwsd.exe Token: SeCreateGlobalPrivilege 2076 Wmiprwsd.exe Token: 33 2076 Wmiprwsd.exe Token: 34 2076 Wmiprwsd.exe Token: 35 2076 Wmiprwsd.exe Token: 36 2076 Wmiprwsd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 728 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 728 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 86 PID 4280 wrote to memory of 4452 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 87 PID 4280 wrote to memory of 4452 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 87 PID 4280 wrote to memory of 4452 4280 341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe 87 PID 4452 wrote to memory of 748 4452 audioadg.exe 88 PID 4452 wrote to memory of 748 4452 audioadg.exe 88 PID 4452 wrote to memory of 748 4452 audioadg.exe 88 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89 PID 748 wrote to memory of 2076 748 Wmiprwsd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\341b77aef07a6db7a0a4435d14f116fe_JaffaCakes118.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:728
-
-
C:\Users\Admin\AppData\Local\Temp\System\audioadg.exeC:\Users\Admin\AppData\Local\Temp\System\audioadg.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeC:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeC:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692KB
MD5341b77aef07a6db7a0a4435d14f116fe
SHA18aa6a8878963ee3cf88a0dcd4b6c319f4dd41935
SHA2564052813833a832623f0954f57ddc69290c9444ad1d58fb634531dc36dc3bb92c
SHA51237e83bfe6fe0e12984e8caf8dc4ec16f27e623c1734a2530608725cc39227f0fece374471144a40d24b7ec6529b71fb44858806169b619b46bc0453501c649d1
-
Filesize
8KB
MD56ac73d462625d27d9f0f599ca1190dea
SHA1746cbcaf898421e361baa72ac5400d6e5d6ef732
SHA256fa35e4d655c8d1eefd9d4bacab0f6d932bd061e23c49503af747161248307f0c
SHA5125789644e331955e2363fd45e45a49bb4266b01ab772d503a8324e4d126ddb2e244297462030a4c63c0088551ef6cac94fa460e4f7ce9f844757afdca4a5d4601