Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe
-
Size
422KB
-
MD5
3c1b1b0997b7708df9dfc922705e27ea
-
SHA1
de2ebe17bbd513b34112c1f54383dcd7bff65f3d
-
SHA256
8ba7c0339ddaee9806d54e193c92d03a114fd047c07db9891d27a087bb044689
-
SHA512
4411c66b7cad2d06a0be522b737f0d07e95abb17d1d0db168b46aabf300e35350d1de27355f7cbbef5ae5d07be8e0c4bc1d269ba9f77e0b2c74f8f448ba20937
-
SSDEEP
6144:tl9rOIhjI3Y3by83TdTcQDRcvxCcZXR5sPEHix0IbBBwNt59p0:N99HDTsnsPEHix0II
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe -
Power Settings 1 TTPs 2 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4456 powercfg.exe 4616 cmd.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 3164 powershell.exe 3164 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 4456 powercfg.exe Token: SeCreatePagefilePrivilege 4456 powercfg.exe Token: SeDebugPrivilege 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe Token: SeDebugPrivilege 3164 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3092 wrote to memory of 4616 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 86 PID 3092 wrote to memory of 4616 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 86 PID 4616 wrote to memory of 4456 4616 cmd.exe 88 PID 4616 wrote to memory of 4456 4616 cmd.exe 88 PID 3092 wrote to memory of 2756 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 89 PID 3092 wrote to memory of 2756 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 89 PID 2756 wrote to memory of 1324 2756 cmd.exe 91 PID 2756 wrote to memory of 1324 2756 cmd.exe 91 PID 3092 wrote to memory of 1996 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 92 PID 3092 wrote to memory of 1996 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 92 PID 1996 wrote to memory of 116 1996 cmd.exe 94 PID 1996 wrote to memory of 116 1996 cmd.exe 94 PID 3092 wrote to memory of 3164 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 95 PID 3092 wrote to memory of 3164 3092 3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3c1b1b0997b7708df9dfc922705e27ea_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powercfg -l2⤵
- Power Settings
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\powercfg.exepowercfg -l3⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c bcdedit2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\system32\bcdedit.exebcdedit3⤵PID:1324
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c fsutil behavior query DisableDeleteNotify2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\fsutil.exefsutil behavior query DisableDeleteNotify3⤵PID:116
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" (get-appxpackage -allusers).name2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82