Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe
-
Size
68KB
-
MD5
3b4ed588d4845093ecec29abd12cf863
-
SHA1
829cd03506adcb03f9851e7a7a1a575080a41142
-
SHA256
6d269c91f637ccab7aaea9f6ecac23eee25b307562d6e0db3b97051ecacf84fb
-
SHA512
c0c46897b14997803a3bed9f1bc075f29169bfcb52f41caf2c9c9cc949344866d196363aad14b98d4c3394a3f21e516ca143184b9136466cb8b0637936038b1f
-
SSDEEP
768:9X1NaObxxe2XE6LOlChYhnQRYIqQsG7lBIYss:V1MMxLXhLYQoQsI8s
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3312 hddmgri.exe 4820 hddmgri.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\hddmgri.exe 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" hddmgri.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ hddmgri.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" hddmgri.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4704 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 4704 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3312 4704 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 86 PID 4704 wrote to memory of 3312 4704 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 86 PID 4704 wrote to memory of 3312 4704 3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b4ed588d4845093ecec29abd12cf863_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\hddmgri.exeC:\Windows\system32\hddmgri.exe -inst2⤵
- Executes dropped EXE
PID:3312
-
-
C:\Windows\SysWOW64\hddmgri.exeC:\Windows\SysWOW64\hddmgri.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4820
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5631bda19fb0bc995a17672f79326e114
SHA1ca7f530fa033a0e8b5c9433a500413744a265f37
SHA256eebf38b80ac93252153118b8310bcb0cd7ca86418ae326d99174510d517d5661
SHA512ad6a59777ae546e36bfc45566986b1b8eeaab155bc05f4658ba36b2b1cbe2d19e1b9044e742793aea44fdfd616066c391f73b0149d32c6bf88880d92b4298844