Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe
-
Size
7KB
-
MD5
5bcddbaa0acbbb0878fc86aa98fbdc5d
-
SHA1
15cb73aa294a434beec7c5d739f7a81424a98cc5
-
SHA256
24d481c7fac417539b600d7336fb4793d7f43c047f59dfe0cf6b221474f20b10
-
SHA512
ebea4b9ee24d3ea76590342111d0fef06daa81755cb20765ac1ddfed7a52f59474fa675f1dda12037564a1e49246a9844b34cd51b7261543a7c6aeded408d271
-
SSDEEP
96:PFgCQwDv0234J3j4t0U22PYk0QAMvu4aB1SZODZaAKfdo2gepYq6NCtl:PmCQQ0m4ljr2QGvzaBOQhYdoopYq6sl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 64.69.47.101 Destination IP 64.69.47.101 Destination IP 216.240.136.66 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4240 wrote to memory of 3832 4240 5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe 84 PID 4240 wrote to memory of 3832 4240 5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe 84 PID 4240 wrote to memory of 3832 4240 5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe 84 PID 3832 wrote to memory of 4492 3832 cmd.exe 87 PID 3832 wrote to memory of 4492 3832 cmd.exe 87 PID 3832 wrote to memory of 4492 3832 cmd.exe 87 PID 3832 wrote to memory of 4740 3832 cmd.exe 95 PID 3832 wrote to memory of 4740 3832 cmd.exe 95 PID 3832 wrote to memory of 4740 3832 cmd.exe 95 PID 3832 wrote to memory of 1384 3832 cmd.exe 98 PID 3832 wrote to memory of 1384 3832 cmd.exe 98 PID 3832 wrote to memory of 1384 3832 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\laa.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\netsh.exenetsh interface ip set dns "6to4 Adapter" static "64.69.47.101"3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4492
-
-
C:\Windows\SysWOW64\netsh.exenetsh interface ip add dns "6to4 Adapter" 216.240.136.66 23⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4740
-
-
C:\Windows\SysWOW64\netsh.exenetsh interface ip set dns "Microsoft IP-HTTPS Platform Interface" static "64.69.47.101"3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5d1b0e24b0ffdd8fa715563110426ced0
SHA1b9131aee2fbcff88b5062a81713e0b1dac9339a9
SHA256919087c1d7cab452e1f9e6f977f9324a24c29ffe44c95fee5056b6d4205826da
SHA512cfa492ec55ef9f94143f8df4c7705bbd3f74a02c232374350f71f143cee54f60e3bb179522d8d133cfca16f5e31be9042dc341b4af8421d1cdc02799d9d5ea35