Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe
-
Size
148KB
-
MD5
40d556f6bb899dc01bf7e41456a8abeb
-
SHA1
d89df92e95f4654158e3f7740002dd94b927aab2
-
SHA256
44cb868a51ebc6614f8ad130f475dd3d264049de717e5661cb7fd3b78a43fe70
-
SHA512
d04d67a74542f924b5bcf0e149e1b99b3b9ef78685872da7e9492c5452fe22c43081aa352bb110ce7da17d18cecf6a031660d07ed240bfe9b040f34788d3f738
-
SSDEEP
3072:z75Nxb4T3btf36HV4J6rmUzz/fL8L0syntarRj:x+Y4J2fr8L0sutw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4280 lsaas.exe 1044 lsaas.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lsaas.exe" 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Firewall = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lsaas.exe" 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5044 set thread context of 3820 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 86 PID 4280 set thread context of 1044 4280 lsaas.exe 88 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 4280 lsaas.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 5044 wrote to memory of 3820 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 86 PID 5044 wrote to memory of 3820 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 86 PID 5044 wrote to memory of 3820 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 86 PID 5044 wrote to memory of 3820 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 86 PID 5044 wrote to memory of 3820 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 86 PID 5044 wrote to memory of 3820 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 86 PID 5044 wrote to memory of 3820 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 86 PID 5044 wrote to memory of 3820 5044 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 86 PID 3820 wrote to memory of 4280 3820 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 87 PID 3820 wrote to memory of 4280 3820 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 87 PID 3820 wrote to memory of 4280 3820 40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe 87 PID 4280 wrote to memory of 1044 4280 lsaas.exe 88 PID 4280 wrote to memory of 1044 4280 lsaas.exe 88 PID 4280 wrote to memory of 1044 4280 lsaas.exe 88 PID 4280 wrote to memory of 1044 4280 lsaas.exe 88 PID 4280 wrote to memory of 1044 4280 lsaas.exe 88 PID 4280 wrote to memory of 1044 4280 lsaas.exe 88 PID 4280 wrote to memory of 1044 4280 lsaas.exe 88 PID 4280 wrote to memory of 1044 4280 lsaas.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40d556f6bb899dc01bf7e41456a8abeb_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\lsaas.exe"C:\Users\Admin\AppData\Local\Temp\lsaas.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\lsaas.exe"C:\Users\Admin\AppData\Local\Temp\lsaas.exe"4⤵
- Executes dropped EXE
PID:1044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD540d556f6bb899dc01bf7e41456a8abeb
SHA1d89df92e95f4654158e3f7740002dd94b927aab2
SHA25644cb868a51ebc6614f8ad130f475dd3d264049de717e5661cb7fd3b78a43fe70
SHA512d04d67a74542f924b5bcf0e149e1b99b3b9ef78685872da7e9492c5452fe22c43081aa352bb110ce7da17d18cecf6a031660d07ed240bfe9b040f34788d3f738