Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe
-
Size
196KB
-
MD5
5d85d71be02948694ea0d07bba6e329b
-
SHA1
d8eeddcced6f59b582ecefda5f3d6ef0d74f2bbb
-
SHA256
0366c69735d1f7504da1b8f50f2c74d27297f116653be232cded3d4d925c8c18
-
SHA512
6a91d97658d66d12eb4f519bddfd05a5ccdc66862c13bfee2e427889b383aeabe5d8d5edff19b58be63c01567867513308295aa38829516d768112245025a43a
-
SSDEEP
3072:mA+YHMDqHNma8yzw1aBOR5OE1EM2jASY1atZgn37zpnop2WtXvs3RA/FLpcuR:mA+YHqyM1ay92NgvpnoJtEhANLpd
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515} svcr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41070-b2b1-21d1-b5c1-0305f4055515}\StubPath = "C:\\windows\\svcr.exe" svcr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1164 svcr.exe -
Executes dropped EXE 1 IoCs
pid Process 1164 svcr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\svcr.exe" 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\system = "C:\\Windows\\svcr.exe" 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\svcr.exe 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe File created C:\Windows\svcr.exe 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1116 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 1116 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 1164 svcr.exe 1164 svcr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1164 svcr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1224 1116 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 84 PID 1116 wrote to memory of 1224 1116 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 84 PID 1116 wrote to memory of 1224 1116 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 84 PID 1116 wrote to memory of 1164 1116 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 88 PID 1116 wrote to memory of 1164 1116 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 88 PID 1116 wrote to memory of 1164 1116 5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe 88 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89 PID 1164 wrote to memory of 2348 1164 svcr.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\NOTEPAD.EXENOTEPAD.EXE2⤵PID:1224
-
-
C:\Windows\svcr.exe"C:\Windows\svcr.exe" "C:\Users\Admin\AppData\Local\Temp\5d85d71be02948694ea0d07bba6e329b_JaffaCakes118.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\NOTEPAD.EXENOTEPAD.EXE3⤵PID:2348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD55d85d71be02948694ea0d07bba6e329b
SHA1d8eeddcced6f59b582ecefda5f3d6ef0d74f2bbb
SHA2560366c69735d1f7504da1b8f50f2c74d27297f116653be232cded3d4d925c8c18
SHA5126a91d97658d66d12eb4f519bddfd05a5ccdc66862c13bfee2e427889b383aeabe5d8d5edff19b58be63c01567867513308295aa38829516d768112245025a43a