Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe
-
Size
806KB
-
MD5
6a135c2e3ba5e6655ee27bf60a359e53
-
SHA1
36713a2c3908567bbf0cd18aa944a522e5d915fc
-
SHA256
c02e35aa90a8a5003feb5e830ec7a1eb461e8d2c79dbe8c72419a0fe864719ca
-
SHA512
05ad73463914b584c8b83f2d8e796f596f34c13fe3f6680b617e03b1dfe32cd3e1776e693d4561eaab617228760c3e1d37c49027116cfde5e3386af5ad366033
-
SSDEEP
12288:1vD+a+J195bR+uSGtZ3pgWKQqnuOHzrV3Dr7Ilnk39yS:17HK5N+cLJKQmHzrV3nMkd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4988 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LocalHost32 = "C:\\Windows\\system32\\lsasrv.exe" 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\lsasrv.exe 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe File created C:\Windows\SysWOW64\lsasrv.exe 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.tmp -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 116 OpenWith.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4988 4720 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe 84 PID 4720 wrote to memory of 4988 4720 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe 84 PID 4720 wrote to memory of 4988 4720 6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.tmpC:\Users\Admin\AppData\Local\Temp\6a135c2e3ba5e6655ee27bf60a359e53_JaffaCakes118.tmp2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4988
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD521506f0849a07db57c7b41d37929fb70
SHA1438e240a2447f71a38234ce07b9a1f54b62763e6
SHA2569cac58351c4032e05c6aa4f3063219e13855d677e8ba35f2ea497548dc0a1f93
SHA512c219a98beee6b71d42789d526581e65dcce0eed3ae2b01c746da9337de66520ea798886b3d239f1d330220a66ae89f6674e62ec3e95bce99bedcf35edfdcee62
-
Filesize
78KB
MD517314db5f7c540e7f1fff7b95bfe45da
SHA18e0fad151ac7fd342c08fee90c1032efd74206cd
SHA256d1a09cbc6d215c7aa0448a2cbc1e0eb01b2bdb117920fa4b7feb68a4e97da879
SHA5122587a76ccd79230fb301a367473a3361eee1019b9cceffe433bdc75b943c30c5bbb6d24d3e87e4e3676db412f2658d526219e736a62b0cced13dd31f97f2809b