Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe
-
Size
88KB
-
MD5
63623f925d63a400ebf84fd5722fa73e
-
SHA1
8da91204b0940633d31df941f9c5a1d707f669d8
-
SHA256
5a00d6f468e02f8c267e713afb157c58cbf1e9cd32db7f8723ec148663c225e4
-
SHA512
76772529b5df3ba498e023896a1ccb623106c3c191498015293bc946e773c098274d49c9083418799af6c55f0fad9a5a8d0a04f3d47cb191b362cc4766724adc
-
SSDEEP
1536:RCcT79F9ZYyi/yp31ocAgYpG6Iv2NyxQAGsTmol0s:5TP3JnNAj6v2sTxl0s
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe = "C:\\Users\\Public\\HD-H83DF-384922-KO\\msngrnem.exe:*:Enabled:Windows Messenger v11" 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3012 msngrnem.exe 4640 msngrnem.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Messenger v11 = "C:\\Users\\Public\\HD-H83DF-384922-KO\\msngrnem.exe" 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 msngrnem.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3448 set thread context of 2580 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 84 PID 3012 set thread context of 4640 3012 msngrnem.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 3012 msngrnem.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2580 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 84 PID 3448 wrote to memory of 2580 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 84 PID 3448 wrote to memory of 2580 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 84 PID 3448 wrote to memory of 2580 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 84 PID 3448 wrote to memory of 2580 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 84 PID 3448 wrote to memory of 2580 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 84 PID 3448 wrote to memory of 2580 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 84 PID 3448 wrote to memory of 2580 3448 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 84 PID 2580 wrote to memory of 3012 2580 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 88 PID 2580 wrote to memory of 3012 2580 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 88 PID 2580 wrote to memory of 3012 2580 63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe 88 PID 3012 wrote to memory of 4640 3012 msngrnem.exe 89 PID 3012 wrote to memory of 4640 3012 msngrnem.exe 89 PID 3012 wrote to memory of 4640 3012 msngrnem.exe 89 PID 3012 wrote to memory of 4640 3012 msngrnem.exe 89 PID 3012 wrote to memory of 4640 3012 msngrnem.exe 89 PID 3012 wrote to memory of 4640 3012 msngrnem.exe 89 PID 3012 wrote to memory of 4640 3012 msngrnem.exe 89 PID 3012 wrote to memory of 4640 3012 msngrnem.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63623f925d63a400ebf84fd5722fa73e_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe"C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe"C:\Users\Public\HD-H83DF-384922-KO\msngrnem.exe"4⤵
- Executes dropped EXE
PID:4640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD563623f925d63a400ebf84fd5722fa73e
SHA18da91204b0940633d31df941f9c5a1d707f669d8
SHA2565a00d6f468e02f8c267e713afb157c58cbf1e9cd32db7f8723ec148663c225e4
SHA51276772529b5df3ba498e023896a1ccb623106c3c191498015293bc946e773c098274d49c9083418799af6c55f0fad9a5a8d0a04f3d47cb191b362cc4766724adc