Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe
-
Size
260KB
-
MD5
4c0ac2e4e8af9839ca6bf8cbf08ff7f3
-
SHA1
6eeaaa8c02898bd6ec325fa4449108a9895b8273
-
SHA256
66e0b9be67ac8ecea069e16dc2d4976ac4b04260ddd04aad1c3c5c5b2df36f25
-
SHA512
7503a7b7f37738bff449ffd4e17b2cc753c0612d7c82d4f6bd7c51d88178964f09f881aae5f7d3c855ac5a1e79f9642a0ca438ceed9498b7561a8cb459460986
-
SSDEEP
6144:9FAqgNMrMNnHGUS0mATGBqxwO54kBzPpSC5T0i8S:jUNKMQUzSwh5bBzseT0m
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\4C0AC2~1.EXE," 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4C0AC2~1.EXE" 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ec1fca43 = "—.\t_\x1e§\u0090(6å™ç\\œæúT„á•iƒ+·$I‹˜~\x06'÷íFöÉúŽÎ(bP\x1f5£Óœ¤\x01ôðžR0SÜ\x1en\tí\u008dR¥…Álì¨ì;³Œê)ߦ\x1deÛ™G¤:º—R\u009dsëüLŠ24_Cš\u008f§{\nS$Â\x13??ÔS5‚dg…Ïe\x15\x14„\a\x14Ú\x1c\x052\x17ß\x02õ\x05\"´\x14,Úš\"Ódê\u00adÇ\u009dBMT—\x1dÇ’\rõ…\n\x12Â]\x035*‚óÜ’Ä\x05\x13zÒ—â´ú2r¥Jç½’l+œ?uš\x14…›mÔ\x02OÕ7”Ú\x17kÝ\x1fz¼³=j\x05ÿ\x1cò*\rÝÃ|\x13UÍOì?\x1drŒ’\x14\x12õ¯e{M%ºÝ|<uJÄ㯄ôªª³\x1d“Ÿ\x7fu\v\\ÂÕe¥+" 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\4C0AC2~1.EXE" 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe Token: SeSecurityPrivilege 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe Token: SeSecurityPrivilege 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe Token: SeSecurityPrivilege 4372 4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4c0ac2e4e8af9839ca6bf8cbf08ff7f3_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372