Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe
-
Size
220KB
-
MD5
5b0eec2cad9696c56031231cd3aadfe7
-
SHA1
f89faf0532fcef570a12dc14c9ecec5cded37d1b
-
SHA256
3f88c9843cb12cb83e1428bd4518a62f6e057904d065a1ff379f4173fc238d50
-
SHA512
eb368a9a030120e89be4881ee28defe381135b5e9be42dbdbe858d9b97c7f359e0d7a692c457375378f020fe8e18cad98c70e2bd8c0cdb3fdfef22b7a51a17ff
-
SSDEEP
3072:tVUmiLbThQWh4gSPqMcFr1TIVBbF/WmzoaVaBvWRHLQiydGKzrulc0POiwLw9YG:knLbNsg6EzTI7J/poa0BeRQi9YC/POyZ
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
mr7bashbab.ddns.net:6606
mr7bashbab.ddns.net:7707
mr7bashbab.ddns.net:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
OBS.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4892-3-0x00000000028C0000-0x00000000028D2000-memory.dmp family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 OBS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3428 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe Token: SeDebugPrivilege 2392 OBS.exe Token: SeDebugPrivilege 2392 OBS.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4460 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 91 PID 4892 wrote to memory of 4460 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 91 PID 4892 wrote to memory of 4460 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 91 PID 4892 wrote to memory of 3356 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 93 PID 4892 wrote to memory of 3356 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 93 PID 4892 wrote to memory of 3356 4892 5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe 93 PID 4460 wrote to memory of 3884 4460 cmd.exe 95 PID 4460 wrote to memory of 3884 4460 cmd.exe 95 PID 4460 wrote to memory of 3884 4460 cmd.exe 95 PID 3356 wrote to memory of 3428 3356 cmd.exe 96 PID 3356 wrote to memory of 3428 3356 cmd.exe 96 PID 3356 wrote to memory of 3428 3356 cmd.exe 96 PID 3356 wrote to memory of 2392 3356 cmd.exe 98 PID 3356 wrote to memory of 2392 3356 cmd.exe 98 PID 3356 wrote to memory of 2392 3356 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b0eec2cad9696c56031231cd3aadfe7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "OBS" /tr '"C:\Users\Admin\AppData\Roaming\OBS.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "OBS" /tr '"C:\Users\Admin\AppData\Roaming\OBS.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:3884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC479.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3428
-
-
C:\Users\Admin\AppData\Roaming\OBS.exe"C:\Users\Admin\AppData\Roaming\OBS.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147B
MD564ce6c7ca2e38324183af712a10d4691
SHA1f82af7065019f72670a1ea39cdf5164d9034ec5c
SHA256dd627fdc154744cd10ac7df53ddf65b1ec2625446c6023da47b28ae9416b5c0a
SHA512881dcdb11462671f1d90c5fb2b2abbeb5458a8d0780a8cf6a0e109beebf747a24ff0bab9f2575dfccaa233ff6cf5fe6c3061750569f7802bc9613424ed9ce0aa
-
Filesize
220KB
MD55b0eec2cad9696c56031231cd3aadfe7
SHA1f89faf0532fcef570a12dc14c9ecec5cded37d1b
SHA2563f88c9843cb12cb83e1428bd4518a62f6e057904d065a1ff379f4173fc238d50
SHA512eb368a9a030120e89be4881ee28defe381135b5e9be42dbdbe858d9b97c7f359e0d7a692c457375378f020fe8e18cad98c70e2bd8c0cdb3fdfef22b7a51a17ff