Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe
-
Size
50KB
-
MD5
437775e12356da0a5e830ab0c0cfcd15
-
SHA1
ccfa05ef4891796e47db6e8719f70d5494f0d0b1
-
SHA256
9feb7464a4f1ba9a5f8d670ea5bd71b8f28cae9b5f4accbd71e93accee11ce9b
-
SHA512
16fb31fbad4fe393f20150589a93d431ebddde1ca33b4383b34ce28f20f0f85c6bad6ff9cf365e0fbc0f7d058051717c6923982ceca9af4cb3c0856576143cfb
-
SSDEEP
768:VN6pRCG10Z8t8yPDtxdkVuctLz+aS/XvhZLqQ5x2TNKhYrfzaWgroex1iuz5GTuX:AGyP3+gvhFDf2wQid3TVGS
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 448 insider.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\guidex.dat 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe File created C:\Windows\SysWOW64\insider.exe cmd.exe File opened for modification C:\Windows\SysWOW64\insider.exe cmd.exe File opened for modification C:\Windows\SysWOW64\guidex.dat insider.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2856 sc.exe 4564 sc.exe 2552 sc.exe 1084 sc.exe 4280 sc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3760 wrote to memory of 2092 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 84 PID 3760 wrote to memory of 2092 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 84 PID 3760 wrote to memory of 2092 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 84 PID 2092 wrote to memory of 2856 2092 cmd.exe 87 PID 2092 wrote to memory of 2856 2092 cmd.exe 87 PID 2092 wrote to memory of 2856 2092 cmd.exe 87 PID 3760 wrote to memory of 3572 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 88 PID 3760 wrote to memory of 3572 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 88 PID 3760 wrote to memory of 3572 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 88 PID 3572 wrote to memory of 4564 3572 cmd.exe 90 PID 3572 wrote to memory of 4564 3572 cmd.exe 90 PID 3572 wrote to memory of 4564 3572 cmd.exe 90 PID 3760 wrote to memory of 4804 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 91 PID 3760 wrote to memory of 4804 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 91 PID 3760 wrote to memory of 4804 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 91 PID 3760 wrote to memory of 5108 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 92 PID 3760 wrote to memory of 5108 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 92 PID 3760 wrote to memory of 5108 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 92 PID 3760 wrote to memory of 1504 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 93 PID 3760 wrote to memory of 1504 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 93 PID 3760 wrote to memory of 1504 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 93 PID 3760 wrote to memory of 1904 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 94 PID 3760 wrote to memory of 1904 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 94 PID 3760 wrote to memory of 1904 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 94 PID 3760 wrote to memory of 2032 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 95 PID 3760 wrote to memory of 2032 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 95 PID 3760 wrote to memory of 2032 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 95 PID 3760 wrote to memory of 4720 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 96 PID 3760 wrote to memory of 4720 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 96 PID 3760 wrote to memory of 4720 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 96 PID 3760 wrote to memory of 2136 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 97 PID 3760 wrote to memory of 2136 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 97 PID 3760 wrote to memory of 2136 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 97 PID 3760 wrote to memory of 3960 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 98 PID 3760 wrote to memory of 3960 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 98 PID 3760 wrote to memory of 3960 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 98 PID 3760 wrote to memory of 4572 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 99 PID 3760 wrote to memory of 4572 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 99 PID 3760 wrote to memory of 4572 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 99 PID 3760 wrote to memory of 3932 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 100 PID 3760 wrote to memory of 3932 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 100 PID 3760 wrote to memory of 3932 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 100 PID 3760 wrote to memory of 1060 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 101 PID 3760 wrote to memory of 1060 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 101 PID 3760 wrote to memory of 1060 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 101 PID 3760 wrote to memory of 4180 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 113 PID 3760 wrote to memory of 4180 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 113 PID 3760 wrote to memory of 4180 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 113 PID 4180 wrote to memory of 2552 4180 cmd.exe 115 PID 4180 wrote to memory of 2552 4180 cmd.exe 115 PID 4180 wrote to memory of 2552 4180 cmd.exe 115 PID 3760 wrote to memory of 4540 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 116 PID 3760 wrote to memory of 4540 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 116 PID 3760 wrote to memory of 4540 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 116 PID 4540 wrote to memory of 1084 4540 cmd.exe 119 PID 4540 wrote to memory of 1084 4540 cmd.exe 119 PID 4540 wrote to memory of 1084 4540 cmd.exe 119 PID 3760 wrote to memory of 436 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 120 PID 3760 wrote to memory of 436 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 120 PID 3760 wrote to memory of 436 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 120 PID 436 wrote to memory of 4280 436 cmd.exe 122 PID 436 wrote to memory of 4280 436 cmd.exe 122 PID 436 wrote to memory of 4280 436 cmd.exe 122 PID 3760 wrote to memory of 3488 3760 437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc stop "Insider"2⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\sc.exesc stop "Insider"3⤵
- Launches sc.exe
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc delete "Insider"2⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\sc.exesc delete "Insider"3⤵
- Launches sc.exe
PID:4564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:4804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:5108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:1504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:1904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:4720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:2136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:3960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:3932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy /B "C:\Users\Admin\AppData\Local\Temp\437775e12356da0a5e830ab0c0cfcd15_JaffaCakes118.exe" "C:\Windows\system32\insider.exe" /Y2⤵
- Drops file in System32 directory
PID:1060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc create "Insider" binPath= "C:\Windows\system32\insider.exe -s" start= auto error= ignore DisplayName= "Insider"2⤵
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\sc.exesc create "Insider" binPath= "C:\Windows\system32\insider.exe -s" start= auto error= ignore DisplayName= "Insider"3⤵
- Launches sc.exe
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc description "Insider" "Insider"2⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\sc.exesc description "Insider" "Insider"3⤵
- Launches sc.exe
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sc start "Insider"2⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\sc.exesc start "Insider"3⤵
- Launches sc.exe
PID:4280
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\8F4F.tmp.bat"2⤵PID:3488
-
-
C:\Windows\SysWOW64\insider.exeC:\Windows\SysWOW64\insider.exe -s1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244B
MD5857aa5d3ac5ab2c8862f1ecefbe91fc8
SHA121c37451df0bc8f7a258fd51f423d4c253349098
SHA256277fb04ffdf22eb0923b325ef297522060afb222f214deeff1b66f797f043a40
SHA512cfa41022da06a447358ac4ac050a5b60bdef7fc36d6bb177448f3796d0b11aecfcdb2bebf73222aa42b0d57b22e3230a03d8c97236af07523bf54e4d58db264e
-
Filesize
16B
MD54ab1c6185c3899a81abe1a9718b7cb22
SHA1b71a9d2638c31d0e98bb33afe15c230b823b7449
SHA256f7a9415ba7e938473bfca67c3123e39cea0df55a0dec9593ca5fe3329e3d77fa
SHA512851c3da9f99baa15926543f281709de097fb8b557ce84c35fc22d21efc4a91bfc9987271ea7833e0198ce01994843db0e20179410451c8a3f1300e4a9edec88f
-
Filesize
50KB
MD5437775e12356da0a5e830ab0c0cfcd15
SHA1ccfa05ef4891796e47db6e8719f70d5494f0d0b1
SHA2569feb7464a4f1ba9a5f8d670ea5bd71b8f28cae9b5f4accbd71e93accee11ce9b
SHA51216fb31fbad4fe393f20150589a93d431ebddde1ca33b4383b34ce28f20f0f85c6bad6ff9cf365e0fbc0f7d058051717c6923982ceca9af4cb3c0856576143cfb