Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe
-
Size
448KB
-
MD5
34c80baa4305387eb70ae9aba0da833e
-
SHA1
065a6b67ca3b0c035edfe943459df9381f28e1d7
-
SHA256
269ee548ec13e1973b361783869a7168d6ea8e9866d217aecc89644fcf3b9474
-
SHA512
a0ebf50ddae69aa1679a1f89099c3224f13298a176b388a70172db821cd60f68be2b68444964ec262e8fe18c34892137b353768e40fe51e849d0e4b77c67cea8
-
SSDEEP
12288:/zOFZykd4pU9AUV6EQhrfV+Fu6Q+0MC3VTJKc4:bkR6pU6UQEgrf//yANKD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3500 mL28601JoFkL28601.exe -
Executes dropped EXE 1 IoCs
pid Process 3500 mL28601JoFkL28601.exe -
resource yara_rule behavioral2/memory/3188-6-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral2/memory/3188-12-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral2/memory/3500-20-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral2/memory/3500-23-0x0000000000400000-0x00000000004F2000-memory.dmp upx behavioral2/memory/3500-30-0x0000000000400000-0x00000000004F2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mL28601JoFkL28601 = "C:\\ProgramData\\mL28601JoFkL28601\\mL28601JoFkL28601.exe" mL28601JoFkL28601.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2892 3188 WerFault.exe 82 1708 3500 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3188 34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe 3188 34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3188 34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe Token: SeDebugPrivilege 3500 mL28601JoFkL28601.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3500 mL28601JoFkL28601.exe 3500 mL28601JoFkL28601.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 3500 3188 34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe 88 PID 3188 wrote to memory of 3500 3188 34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe 88 PID 3188 wrote to memory of 3500 3188 34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 6762⤵
- Program crash
PID:2892
-
-
C:\ProgramData\mL28601JoFkL28601\mL28601JoFkL28601.exe"C:\ProgramData\mL28601JoFkL28601\mL28601JoFkL28601.exe" "C:\Users\Admin\AppData\Local\Temp\34c80baa4305387eb70ae9aba0da833e_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 6683⤵
- Program crash
PID:1708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3188 -ip 31881⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3500 -ip 35001⤵PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD518ba421ee3e3d2ba797fa51418fb8490
SHA13be91f23fff0d9266da234e06e24daf79f0be34f
SHA256e2a7a1fe7714bda21e78e87a4f32e6834720874e60390d9969461effcee1aa43
SHA5129cf7e20894edef6f0fad3f1d724c3ae117687cda1f590cfaf931c10b7972a713149f6b8e7a6cfeb3c2e171d0620753eea674fd6f37bb73d7a7cc725ce68c3d13
-
Filesize
448KB
MD587a84ad3c23bc1309571f02c1db10d6c
SHA13277fe7954ae00d4a8a9e01efeb50cebbf4da602
SHA2565f455918fc94d551213f77d847c5c775b6039ee162bd7f843ec0c81b43102fdc
SHA5120f9d7e12eae19d42abb9d57ac437cdcfa70c1a37d723284ac874b71464b33313ed3dd9d2933ee47fce83fd5550a3d673fc45477162ba7ef9b4512655c5c8383b