Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe
-
Size
491KB
-
MD5
611efffea1d58b68a3967e98b8c70e83
-
SHA1
fc337463b6b2da9b61b1dc3a068de038cd6b37e9
-
SHA256
1a13d16848e43115530eb8ab59d019ad1f640ed4a84f665296e2611bfe3eb1c8
-
SHA512
bd7bdd62b075000014be03ead5733f9655afc4799021d294b2743344d49133f24be909f94fca2885ee33b0e158c56487305f34f378bbd09e0c1cfb88f0837be0
-
SSDEEP
12288:TBqMD6NTVD/7Ftyq1zH6NZU1D8fBbQji4+8E:1qMD6NNzdzH68ufty+8E
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2992 MSB.exe 4716 tmp.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine MSB.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4716 tmp.exe 4716 tmp.exe 4716 tmp.exe 4716 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2992 MSB.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4188 wrote to memory of 2992 4188 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 84 PID 4188 wrote to memory of 2992 4188 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 84 PID 4188 wrote to memory of 2992 4188 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 84 PID 2992 wrote to memory of 4716 2992 MSB.exe 86 PID 2992 wrote to memory of 4716 2992 MSB.exe 86 PID 2992 wrote to memory of 4716 2992 MSB.exe 86 PID 4716 wrote to memory of 3456 4716 tmp.exe 56 PID 4716 wrote to memory of 3456 4716 tmp.exe 56 PID 4716 wrote to memory of 3456 4716 tmp.exe 56 PID 4716 wrote to memory of 3456 4716 tmp.exe 56 PID 4716 wrote to memory of 3456 4716 tmp.exe 56 PID 4716 wrote to memory of 3456 4716 tmp.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSB.exe3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD53a4f1ca2300e01c33c86e898cf95b1cb
SHA19762eccb2176d86aaa8b2b3cb6d10ab44862f2b3
SHA25613627e7ecdf6f2cd98299e80290d142b0bcca2fdb31d457944ee63e47f4e2d4f
SHA512e7bbb2c267d5cf6778d57c44cbff33b42c26316c489db1a9055024b55e69f373e0c271f6c39dc193ec4b43094d7109c89b61a08b9ab71566c6feeb78d4645405
-
Filesize
49KB
MD590844b94b6fffe1d9b3de90697a876dc
SHA1146a6821b0e3105cd2245c496a9eb34f44a7471d
SHA256100a7049f39b8b47cabeb1b2257d0f50de17df208d2c5e860250405a98add7f5
SHA512f4bf5e82731867e4786bdc947d8926f748c1cb496cf06b6a7f936929480e3f89ea274c105ffbf8a4e92861e3db5cab11d48696e95452866469066ca76b497507