Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
4388df2fc2175b61291872d250636c7d
-
SHA1
2785816a119b8e7ac72ecd9b07ba1ac50729c140
-
SHA256
e89bf48b850461d265b7334a711e40bffd3cf4e03fa6a077bdd4cb3317c40e82
-
SHA512
98c68643c408bc2910fbfefaee697278d8b67db8c0f5a10873143cc6535ce02b05b2a298e5a77fc6a228e7945ca5a1d9e23d9aa1a68e2b87b7076228520475ed
-
SSDEEP
49152:DOw0Q7JUd4vKVmENPNlgz/YQKB+wMt+SOl3qcYllMBhlHz2rE0cOZ44KjQiejD6/:DOw0Q7JMQKVphNlg0QKct+SOl6cYvMzl
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234c2-21.dat family_ardamax -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 4364 explorer.exe 4560 FQO.exe -
Loads dropped DLL 1 IoCs
pid Process 4560 FQO.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FQO Start = "C:\\Windows\\SysWOW64\\JHPMIJ\\FQO.exe" FQO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\JHPMIJ\ FQO.exe File created C:\Windows\SysWOW64\JHPMIJ\FQO.004 explorer.exe File created C:\Windows\SysWOW64\JHPMIJ\FQO.001 explorer.exe File created C:\Windows\SysWOW64\JHPMIJ\FQO.002 explorer.exe File created C:\Windows\SysWOW64\JHPMIJ\AKV.exe explorer.exe File created C:\Windows\SysWOW64\JHPMIJ\FQO.exe explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3596 set thread context of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\explorer.exe 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\explorer.exe 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4560 FQO.exe Token: SeIncBasePriorityPrivilege 4560 FQO.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4560 FQO.exe 4560 FQO.exe 4560 FQO.exe 4560 FQO.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 3596 wrote to memory of 4364 3596 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 86 PID 4364 wrote to memory of 4560 4364 explorer.exe 87 PID 4364 wrote to memory of 4560 4364 explorer.exe 87 PID 4364 wrote to memory of 4560 4364 explorer.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe"1⤵
- Disables RegEdit via registry modification
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\explorer.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\explorer.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\JHPMIJ\FQO.exe"C:\Windows\system32\JHPMIJ\FQO.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34
-
Filesize
456KB
MD551507d91d43683b9c4b8fafeb4d888f8
SHA1ead2f68338da7af4720378cd46133589fc9405ba
SHA25671b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b
SHA512a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
1KB
MD5c419eadafd70c55f88b6235ccf3d14a0
SHA1e04856391e275bfe54fdc6dfabdfe798f80d2afb
SHA25676f3de81ac5a57b368786feffd51e82c49527298bd6ed554ae2cdac118043968
SHA5124b3e1e8d94f7e8bd9a32758fab27b2fed6299882a092fea578e1107655e9d5a7d9480eca2c205b3a85e897a1ae3ffd92587b7c4b9ccd3722bb84bfb45a30f683
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9