Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
3e1798ea5420466c1667188e41e171cb_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
3e1798ea5420466c1667188e41e171cb_JaffaCakes118.exe
-
Size
836KB
-
MD5
3e1798ea5420466c1667188e41e171cb
-
SHA1
8f2003047624655cc5658c9019226c04e7cf7b24
-
SHA256
2cfd2f69f21e92ff67d83babb0c5735bf99cc62961ddfa193f7385467c31c135
-
SHA512
94b8da7be35354e05781cabba1f6503237bf7724a031746f1f15f6d7329e139c1037231f45516f58e784e51a8c50f632b0bf16e9254a0bafbba88d0786bdf468
-
SSDEEP
12288:9ohV56tb4hr+fbtM0E92BD6KqnU7UIXTgdBzAXxto/lJ/zD:9ohV56d41p6BD1qnUQito/D
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Crypted.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uploadflashplayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uploadflashplayer.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Crypted.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" uploadflashplayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" uploadflashplayer.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 3e1798ea5420466c1667188e41e171cb_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation Crypted.exe -
Executes dropped EXE 3 IoCs
pid Process 4108 Crypted.exe 3032 uploadflashplayer.exe 1904 uploadflashplayer.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" uploadflashplayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" uploadflashplayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" Crypted.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Crypted.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uploadflashplayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uploadflashplayer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3032 set thread context of 1904 3032 uploadflashplayer.exe 89 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\Dofus 2\app\temp.txt uploadflashplayer.exe File created C:\Program Files (x86)\Dofus 2\app\DofusMod.exe uploadflashplayer.exe File created C:\Program Files (x86)\Dofus 2\app\temp.txt uploadflashplayer.exe File created C:\Program Files\Dofus 2\app\DofusMod.exe uploadflashplayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1904 uploadflashplayer.exe 1904 uploadflashplayer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2360 3e1798ea5420466c1667188e41e171cb_JaffaCakes118.exe Token: SeBackupPrivilege 4108 Crypted.exe Token: SeBackupPrivilege 3032 uploadflashplayer.exe Token: SeBackupPrivilege 1904 uploadflashplayer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4108 Crypted.exe 3032 uploadflashplayer.exe 1904 uploadflashplayer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2360 wrote to memory of 4108 2360 3e1798ea5420466c1667188e41e171cb_JaffaCakes118.exe 86 PID 2360 wrote to memory of 4108 2360 3e1798ea5420466c1667188e41e171cb_JaffaCakes118.exe 86 PID 2360 wrote to memory of 4108 2360 3e1798ea5420466c1667188e41e171cb_JaffaCakes118.exe 86 PID 4108 wrote to memory of 3032 4108 Crypted.exe 88 PID 4108 wrote to memory of 3032 4108 Crypted.exe 88 PID 4108 wrote to memory of 3032 4108 Crypted.exe 88 PID 3032 wrote to memory of 1904 3032 uploadflashplayer.exe 89 PID 3032 wrote to memory of 1904 3032 uploadflashplayer.exe 89 PID 3032 wrote to memory of 1904 3032 uploadflashplayer.exe 89 PID 3032 wrote to memory of 1904 3032 uploadflashplayer.exe 89 PID 3032 wrote to memory of 1904 3032 uploadflashplayer.exe 89 PID 3032 wrote to memory of 1904 3032 uploadflashplayer.exe 89 PID 3032 wrote to memory of 1904 3032 uploadflashplayer.exe 89 PID 3032 wrote to memory of 1904 3032 uploadflashplayer.exe 89 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Crypted.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uploadflashplayer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" uploadflashplayer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e1798ea5420466c1667188e41e171cb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3e1798ea5420466c1667188e41e171cb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Crypted.exe"C:\Users\Admin\AppData\Local\Temp\Crypted.exe"2⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\uploadflashplayer.exe"C:\Users\Admin\AppData\Local\Temp\uploadflashplayer.exe"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\uploadflashplayer.exeC:\Users\Admin\AppData\Local\Temp\uploadflashplayer.exe4⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1904
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
620KB
MD529ebc64eb6ced58520999c37752e217c
SHA1e3024f1beb2464e979bf534c086c6dc52a802c41
SHA25653c9ad62d0e7014e6405c827964e06fed8671348b13244b4173fa455bf4b6337
SHA5120d89bcd2628e89f06bc91a2bce2edd2556393690c318cef937082526a86b6b6c0781dbd1c9ce67fe8650974e0caec372878428e8dcf562cb483e9980697e7c82
-
Filesize
620KB
MD56e8a660284e87843585f009b8a906649
SHA1851ff02388ed77e5a7b6e040d788f0787f124101
SHA256619a516bf0ab708f0816b4b817a8e209ce8632efbd03dca0f7e1c786f78fca13
SHA512dc17d0d0df9ac301d0f8fcbe31eeec5e3ba8051466304a0b2140318f47b38b428edf3f818effaec86309be571db26ae622b9aa08e85826d4ffb1747d3f74ef87