Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
361486f6bd20657d7271e659098a828d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
361486f6bd20657d7271e659098a828d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
361486f6bd20657d7271e659098a828d_JaffaCakes118.exe
-
Size
26KB
-
MD5
361486f6bd20657d7271e659098a828d
-
SHA1
76eb46ef6725e360b4b96072a70bc2968ac47c93
-
SHA256
534eb8df542c570aa614f86e6b58875ef5a3f5cd95a206832969eeaf038d633d
-
SHA512
84ebbba845bdaf1a819e5db16700668d002aa32323349672d83ec1408a4cbe8d10d7fa23321957c5aace7dcb3bcfb2976accec03a3cd989d079acefeb4846f1a
-
SSDEEP
384:uLzeXxIfYSBrkzdfcTZk4EOzOqfmjDDsF8FY1HbFBf83LuP/:oe0YSddLC0isFV1pa3La
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe logon.exe" 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\361486f6bd20657d7271e659098a828d_JaffaCakes118.exe" 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\vrd.inf_amd64_81fbd405ff2470fc\vrd.sys 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\FileRepository\compositebus.inf_amd64_7500cffa210c6946\CompositeBus.sys 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\FileRepository\uefi.inf_amd64_c1628ffa62c8e54c\UEFI.sys 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\FileRepository\ufxchipidea.inf_amd64_1c78775fffab6a0a\UfxChipidea.sys 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\FileRepository\urschipidea.inf_amd64_78ad1c14e33df968\urschipidea.sys 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\FileRepository\urssynopsys.inf_amd64_057fa37902020500\urssynopsys.sys 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\FileRepository\genericusbfn.inf_amd64_53931f0ae21d6d2c\genericusbfn.sys 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\FileRepository\swenum.inf_amd64_16a14542b63c02af\swenum.sys 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\FileRepository\umbus.inf_amd64_b78a9c5b6fd62c27\umbus.sys 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 364 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe 364 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 364 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 364 wrote to memory of 788 364 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe 8 PID 364 wrote to memory of 3380 364 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe 86 PID 364 wrote to memory of 3380 364 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe 86 PID 364 wrote to memory of 3380 364 361486f6bd20657d7271e659098a828d_JaffaCakes118.exe 86
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\361486f6bd20657d7271e659098a828d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\361486f6bd20657d7271e659098a828d_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %12⤵PID:3380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5fccd3ed766c0a6ea474ea49d21a327b7
SHA10b1b25246d64b8507736630ffd111148ca70b69a
SHA256078200d745256275cb7bf03694f492d7ae05524e80328a515cf46c1a005bd233
SHA512fb3a72b0c842f281caa0ed31095ceaa6d13eba2c6065899d0d490ce2447d41743dcd6617a70893b3aac42449bfdb2806e17ba441f158862c75a8fdbdc25bee9e