Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
35s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
495865ca486c23161737b692e93eac57_JaffaCakes118.exe
Resource
win7-20240708-en
Errors
General
-
Target
495865ca486c23161737b692e93eac57_JaffaCakes118.exe
-
Size
322KB
-
MD5
495865ca486c23161737b692e93eac57
-
SHA1
d4fed10f284c8dac75020f366f74d8010caeb120
-
SHA256
39bc52912cf67b1d653f00b2585e6cc1549e25f891f91baa8d1e66501ef33351
-
SHA512
5d6669d4de2204e20f8751622be72bc5f47bf4a451c9dbb4f86ca0687e1ed1128f651c1a8f018a2276b0c6e7fb7792fb262f204f91d65f21514d4ffbfddf0356
-
SSDEEP
6144:Uu3SjaqpYkkrF2rSh64gFz/Kskh1ymcwjkYOoujxj6sl:yja+Yk2KShNsrkzyo47oQN6
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4868 sc.exe -
Runs .reg file with regedit 3 IoCs
pid Process 3548 regedit.exe 3612 regedit.exe 1588 regedit.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2052 1384 495865ca486c23161737b692e93eac57_JaffaCakes118.exe 83 PID 1384 wrote to memory of 2052 1384 495865ca486c23161737b692e93eac57_JaffaCakes118.exe 83 PID 1384 wrote to memory of 2052 1384 495865ca486c23161737b692e93eac57_JaffaCakes118.exe 83 PID 2052 wrote to memory of 3548 2052 cmd.exe 95 PID 2052 wrote to memory of 3548 2052 cmd.exe 95 PID 2052 wrote to memory of 3548 2052 cmd.exe 95 PID 2052 wrote to memory of 1972 2052 cmd.exe 96 PID 2052 wrote to memory of 1972 2052 cmd.exe 96 PID 2052 wrote to memory of 1972 2052 cmd.exe 96 PID 2052 wrote to memory of 3440 2052 cmd.exe 97 PID 2052 wrote to memory of 3440 2052 cmd.exe 97 PID 2052 wrote to memory of 3440 2052 cmd.exe 97 PID 2052 wrote to memory of 1448 2052 cmd.exe 98 PID 2052 wrote to memory of 1448 2052 cmd.exe 98 PID 2052 wrote to memory of 1448 2052 cmd.exe 98 PID 2052 wrote to memory of 2148 2052 cmd.exe 100 PID 2052 wrote to memory of 2148 2052 cmd.exe 100 PID 2052 wrote to memory of 2148 2052 cmd.exe 100 PID 2052 wrote to memory of 516 2052 cmd.exe 101 PID 2052 wrote to memory of 516 2052 cmd.exe 101 PID 2052 wrote to memory of 516 2052 cmd.exe 101 PID 2052 wrote to memory of 4988 2052 cmd.exe 102 PID 2052 wrote to memory of 4988 2052 cmd.exe 102 PID 2052 wrote to memory of 4988 2052 cmd.exe 102 PID 2052 wrote to memory of 1940 2052 cmd.exe 103 PID 2052 wrote to memory of 1940 2052 cmd.exe 103 PID 2052 wrote to memory of 1940 2052 cmd.exe 103 PID 2052 wrote to memory of 4048 2052 cmd.exe 104 PID 2052 wrote to memory of 4048 2052 cmd.exe 104 PID 2052 wrote to memory of 4048 2052 cmd.exe 104 PID 2052 wrote to memory of 520 2052 cmd.exe 105 PID 2052 wrote to memory of 520 2052 cmd.exe 105 PID 2052 wrote to memory of 520 2052 cmd.exe 105 PID 2052 wrote to memory of 1412 2052 cmd.exe 106 PID 2052 wrote to memory of 1412 2052 cmd.exe 106 PID 2052 wrote to memory of 1412 2052 cmd.exe 106 PID 2052 wrote to memory of 332 2052 cmd.exe 107 PID 2052 wrote to memory of 332 2052 cmd.exe 107 PID 2052 wrote to memory of 332 2052 cmd.exe 107 PID 2052 wrote to memory of 1232 2052 cmd.exe 108 PID 2052 wrote to memory of 1232 2052 cmd.exe 108 PID 2052 wrote to memory of 1232 2052 cmd.exe 108 PID 2052 wrote to memory of 1380 2052 cmd.exe 109 PID 2052 wrote to memory of 1380 2052 cmd.exe 109 PID 2052 wrote to memory of 1380 2052 cmd.exe 109 PID 2052 wrote to memory of 4176 2052 cmd.exe 110 PID 2052 wrote to memory of 4176 2052 cmd.exe 110 PID 2052 wrote to memory of 4176 2052 cmd.exe 110 PID 2052 wrote to memory of 964 2052 cmd.exe 111 PID 2052 wrote to memory of 964 2052 cmd.exe 111 PID 2052 wrote to memory of 964 2052 cmd.exe 111 PID 2052 wrote to memory of 4108 2052 cmd.exe 112 PID 2052 wrote to memory of 4108 2052 cmd.exe 112 PID 2052 wrote to memory of 4108 2052 cmd.exe 112 PID 2052 wrote to memory of 232 2052 cmd.exe 113 PID 2052 wrote to memory of 232 2052 cmd.exe 113 PID 2052 wrote to memory of 232 2052 cmd.exe 113 PID 2052 wrote to memory of 4476 2052 cmd.exe 114 PID 2052 wrote to memory of 4476 2052 cmd.exe 114 PID 2052 wrote to memory of 4476 2052 cmd.exe 114 PID 2052 wrote to memory of 3660 2052 cmd.exe 115 PID 2052 wrote to memory of 3660 2052 cmd.exe 115 PID 2052 wrote to memory of 3660 2052 cmd.exe 115 PID 2052 wrote to memory of 3908 2052 cmd.exe 116 -
Views/modifies file attributes 1 TTPs 22 IoCs
pid Process 3440 attrib.exe 516 attrib.exe 4176 attrib.exe 964 attrib.exe 4476 attrib.exe 4376 attrib.exe 1448 attrib.exe 2148 attrib.exe 4988 attrib.exe 4048 attrib.exe 232 attrib.exe 3660 attrib.exe 3908 attrib.exe 1408 attrib.exe 4108 attrib.exe 1972 attrib.exe 1940 attrib.exe 520 attrib.exe 1412 attrib.exe 332 attrib.exe 1232 attrib.exe 1380 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\495865ca486c23161737b692e93eac57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\495865ca486c23161737b692e93eac57_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~9AC9.bat "C:\Users\Admin\AppData\Local\Temp\495865ca486c23161737b692e93eac57_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\regedit.exeregedit /s rem.reg3⤵
- Runs .reg file with regedit
PID:3548
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\avgautostart.reg3⤵
- Views/modifies file attributes
PID:1972
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\wget.exe3⤵
- Views/modifies file attributes
PID:3440
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\cfet.exe3⤵
- Views/modifies file attributes
PID:1448
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\cfett.exe3⤵
- Views/modifies file attributes
PID:2148
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\inetload.exe3⤵
- Views/modifies file attributes
PID:516
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\inetill.exe3⤵
- Views/modifies file attributes
PID:4988
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\fs.exe3⤵
- Views/modifies file attributes
PID:1940
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\ncftppu.exe3⤵
- Views/modifies file attributes
PID:4048
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\sys.exe3⤵
- Views/modifies file attributes
PID:520
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\firsttimer.exe3⤵
- Views/modifies file attributes
PID:1412
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\firsttime.exe3⤵
- Views/modifies file attributes
PID:332
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\slp.exe3⤵
- Views/modifies file attributes
PID:1232
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\hpclnt.exe3⤵
- Views/modifies file attributes
PID:1380
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\inetill_service.exe3⤵
- Views/modifies file attributes
PID:4176
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\hpsrv.exe3⤵
- Views/modifies file attributes
PID:964
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\hpload.reg3⤵
- Views/modifies file attributes
PID:4108
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\system32\ftpcmr.exe3⤵
- Views/modifies file attributes
PID:232
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Dokumente und Einstellungen\All Users\Startmenāæ\Programme\Autostart\ftpcmrs.exe"3⤵
- Views/modifies file attributes
PID:4476
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ftpcmrs.exe"3⤵
- Views/modifies file attributes
PID:3660
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ftpcmrs.exe"3⤵
- Views/modifies file attributes
PID:3908
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\help\*.bat3⤵
- Views/modifies file attributes
PID:1408
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s rem.reg3⤵
- Runs .reg file with regedit
PID:3612
-
-
C:\Windows\SysWOW64\net.exenet stop Internet_Service3⤵PID:1020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Internet_Service4⤵PID:4960
-
-
-
C:\Windows\SysWOW64\sc.exesc delete Internet_Service3⤵
- Launches sc.exe
PID:4868
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s rem.reg3⤵
- Runs .reg file with regedit
PID:1588
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown -r -t 1 -f3⤵PID:4416
-
-
C:\Windows\SysWOW64\attrib.exeattrib -h C:\Windows\help\*.bat3⤵
- Views/modifies file attributes
PID:4376
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3958855 /state1:0x41c64e6d1⤵PID:712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a67b9e6e1721004b049d8fef7ac27b51
SHA1e7953a94fea2c27a7cf00cd1b1cbf7ebed59a24e
SHA2560ad0ec03837edb6341511097c0e8086e69127b0358c0597d05a4ed8ac6fb9d20
SHA512b93f670eb0cde09bdf6a1ffc34330aa2801ab8a28fcea2eccfe223ef1affe1c6bfb44356be7b582e0bbd70223e27ff5be4d350b4bf8bec9ed9effd1dcf1dfdc5