Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe
-
Size
441KB
-
MD5
483fa0dc151245c93e292e09af86cc5a
-
SHA1
a212dbd2bc2a52487d00df419ca49a676eaee931
-
SHA256
e897e2b23acce18a744e5f12bf095f182be770d8bf80b5ad131fc9147758da9a
-
SHA512
014c2f48050e52eee9acf61fc545b37cb781f081048fe56181a2395acd8798dda3ccaa61e5708253bac17f535416de9b3a3f0de33590bf21582aea3aece50240
-
SSDEEP
12288:odubBH86AjEQ0g6vbFJOtLkzjRHDi83SuaT/:oU+FvMMItj/3SHT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1144 nH01803MeApL01803.exe -
Executes dropped EXE 1 IoCs
pid Process 1144 nH01803MeApL01803.exe -
resource yara_rule behavioral2/memory/3504-1-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral2/memory/3504-2-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3504-16-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3504-15-0x0000000000400000-0x00000000004BF000-memory.dmp upx behavioral2/memory/1144-19-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1144-18-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1144-27-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/1144-34-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nH01803MeApL01803 = "C:\\ProgramData\\nH01803MeApL01803\\nH01803MeApL01803.exe" nH01803MeApL01803.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3504 483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe 3504 483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3504 483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe Token: SeDebugPrivilege 1144 nH01803MeApL01803.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1144 nH01803MeApL01803.exe 1144 nH01803MeApL01803.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3504 wrote to memory of 1144 3504 483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe 86 PID 3504 wrote to memory of 1144 3504 483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe 86 PID 3504 wrote to memory of 1144 3504 483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\ProgramData\nH01803MeApL01803\nH01803MeApL01803.exe"C:\ProgramData\nH01803MeApL01803\nH01803MeApL01803.exe" "C:\Users\Admin\AppData\Local\Temp\483fa0dc151245c93e292e09af86cc5a_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
441KB
MD599f50c1308583f2eda9204977ae25252
SHA1a951b43c5aa8ee02c0df9e4788f47ad2e07573a8
SHA256cfc5a248d498156c1e46c300d646a00980e3a55bde137c83aa8e661496eb89c8
SHA512da603ee77c34fb1b92415bd131890b0546ebf508704f54e48c770f4025e3f475c8bca8e9ee7d8f0ce0ca9b9ccda3eb6519158033cdb343f1d7923d933c668b3f