Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe
-
Size
16KB
-
MD5
3866845a5ec9b47ce2df51025a1bfa0b
-
SHA1
69cfb0d7f84e81b4fc491808413642beffea350b
-
SHA256
524b29eb85a279afeca8b7d0d6fd7cdd24d18e7c1a311a95d9b3f8a652cef8ff
-
SHA512
b17561816f811e41a71592809d13feb86e99a9c5a71199caff1316360244c84866af749535ed3d2f25c9349c6a1d6f36011dad22d0462eacbeb9a3ed40eccc1b
-
SSDEEP
384:Tz1snRhQX9V+hfSIMJnWOLCM0g1De5073V/u8FXu20nLjJi:F0M9charbGM0g1De5073VG8420nc
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\qrsqxeee.dll = "{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}" 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1256 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qrsqxeee.nls 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07} 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32\ = "C:\\Windows\\SysWow64\\qrsqxeee.dll" 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7A6DF30E-D0F2-446f-B4F0-BF4232D60E07}\InProcServer32\ThreadingModel = "Apartment" 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1256 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 1256 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1256 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 1256 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 1256 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1256 wrote to memory of 4400 1256 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 88 PID 1256 wrote to memory of 4400 1256 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 88 PID 1256 wrote to memory of 4400 1256 3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\F4D.tmp.bat2⤵PID:4400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD590c15833d1e13bfe9fabaae00133d15d
SHA14559d77cf9fa5f9d36a5bad1ce8c51be39a8a55d
SHA256b14d69da28f9395382524d6d585cf61c901f5ecc1ca0c9697ed835530a250015
SHA512a56fb90e77f88793c1415167800b3de0dcd745f625a7686ea03f1a86c04c270f3f7c608eb06274c2959c13b6cae5591051b4ce201393b298b4e5ad448be7dcff
-
Filesize
2.3MB
MD52f858ff5b919009ddc724e808bc4cd28
SHA145718eb8c8b00116630bbc087997b161e01be461
SHA256388bb1bb3828a2f5227bb117c91526d0b124bfbb9d9f39af0f983943d81da09c
SHA51276c1b42a9ff56cc7b9326d2bb9068e4126672b1423b0f0d8f62dcb68b6f86134151a82180bbad3e8e9533a4b338381e0a66d1f7828d8d0a835c3c6eba778da53