Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe
-
Size
17KB
-
MD5
4bdef79bc1f1709049f3f4e1aefa9d3a
-
SHA1
1f923501094b234ef59596adab187874f734e882
-
SHA256
160d68f65b5ab4690993398f63a3407d113f5ce70e35aee6a44e1b36b637047c
-
SHA512
30a210ba33ef4eb6bc32cb50d93d2b46376d90b0ff90cebfa00873721e6fe45efdc7f576af18e7c1d57d3032006d3e5ddc59df62fa9020fe19e1201c9a8e07c9
-
SSDEEP
384:Ny+26QIVmapXo0rridertW0w0PBVrivaa2zFAVhh:NLFQI/YirCkwGV2yFzFi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4848 utorrent.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\utorrent.exe 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe File opened for modification C:\Windows\utorrent.exe 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ utorrent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" utorrent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" utorrent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" utorrent.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" utorrent.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3520 wrote to memory of 1496 3520 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe 86 PID 3520 wrote to memory of 1496 3520 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe 86 PID 3520 wrote to memory of 1496 3520 4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe 86 PID 1496 wrote to memory of 4720 1496 cmd.exe 89 PID 1496 wrote to memory of 4720 1496 cmd.exe 89 PID 1496 wrote to memory of 4720 1496 cmd.exe 89 PID 4720 wrote to memory of 4572 4720 net.exe 90 PID 4720 wrote to memory of 4572 4720 net.exe 90 PID 4720 wrote to memory of 4572 4720 net.exe 90 PID 1496 wrote to memory of 4536 1496 cmd.exe 91 PID 1496 wrote to memory of 4536 1496 cmd.exe 91 PID 1496 wrote to memory of 4536 1496 cmd.exe 91 PID 4536 wrote to memory of 3800 4536 net.exe 92 PID 4536 wrote to memory of 3800 4536 net.exe 92 PID 4536 wrote to memory of 3800 4536 net.exe 92 PID 4848 wrote to memory of 1776 4848 utorrent.exe 93 PID 4848 wrote to memory of 1776 4848 utorrent.exe 93 PID 4848 wrote to memory of 1776 4848 utorrent.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4bdef79bc1f1709049f3f4e1aefa9d3a_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\a.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵PID:4572
-
-
-
C:\Windows\SysWOW64\net.exenet stop winvnc43⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winvnc44⤵PID:3800
-
-
-
-
C:\Windows\utorrent.exe"C:\Windows\utorrent.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\a.bat" "2⤵PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD54bdef79bc1f1709049f3f4e1aefa9d3a
SHA11f923501094b234ef59596adab187874f734e882
SHA256160d68f65b5ab4690993398f63a3407d113f5ce70e35aee6a44e1b36b637047c
SHA51230a210ba33ef4eb6bc32cb50d93d2b46376d90b0ff90cebfa00873721e6fe45efdc7f576af18e7c1d57d3032006d3e5ddc59df62fa9020fe19e1201c9a8e07c9
-
Filesize
71B
MD54db2c561024318efaf926a8e0a6ebc36
SHA18e3060152b239e7c7bc488e79030b9e3c13de066
SHA256f9ea85780a059d9338c359925ec487588102ef55be4062ec4ac19efc8af59f0f
SHA512df700bc9348e147ceb1db687974c567fdff052d73eb4709b718f3b3dfaf44116a5a70c0ae62438416888c0783a575e524f501da1308bbc987443ec3c852bef99