Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 17:54
Static task
static1
Behavioral task
behavioral1
Sample
46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe
-
Size
76KB
-
MD5
46e39a5f32136bef752b128de0af54d7
-
SHA1
0e6fbf9f629e70feec9f149ddd48d4925c843e78
-
SHA256
ef0bfac8bd8acb943449d81d9505cabe0885094c4b387f1268e3c496006d78c7
-
SHA512
3c6809d1aec3ecbf7ee77bc8137b45812161869f057bc034395bd6d5173fd36874fd9c227207a4b3521c806e788b90f36d6a0ce055d83ab0d94f90a3e4d85583
-
SSDEEP
1536:t5IctgeInVw24Mu9kJxlJoCtghVlJOmcKuVTD1:t5Ictrcwiu9kJxlOBEx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4464 winNzbfP.exe -
resource yara_rule behavioral2/files/0x000900000002339b-4.dat upx behavioral2/memory/4464-11-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4464-18-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winNzbfP = "C:\\Windows\\system32\\winNzbfP.exe" 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\winNzbfP.exe 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SoftWare winNzbfP.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4464 winNzbfP.exe 4464 winNzbfP.exe 4464 winNzbfP.exe 4464 winNzbfP.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2028 wrote to memory of 4464 2028 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe 86 PID 2028 wrote to memory of 4464 2028 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe 86 PID 2028 wrote to memory of 4464 2028 46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\46e39a5f32136bef752b128de0af54d7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\winNzbfP.exe"C:\Windows\System32\winNzbfP.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD50aa29f812f9362a7aa0efcc6571a45c3
SHA17de2999d3527717376a75e5f2724610e401ff61f
SHA2562cde921c6a4a79a0767054699b284fdc0c09921945995b8f27021bf43933fa9f
SHA5129bcc759635c8034244180b6a916760e3dc9876aa308c8df50c693934f9966f26bb82af8bfa5476132706b8b776a5eaef701d67bc12d83a3cc9be70fe1d85ec89