Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 23:13
Behavioral task
behavioral1
Sample
71a3f29f7526efc9c399e89927a32ab6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71a3f29f7526efc9c399e89927a32ab6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
71a3f29f7526efc9c399e89927a32ab6_JaffaCakes118.exe
-
Size
263KB
-
MD5
71a3f29f7526efc9c399e89927a32ab6
-
SHA1
5f3b8c91113cacd367c303b0e6f2df66545fdf80
-
SHA256
1a9d19d4c7e9d3502ab36dc147f3b7093247321a2ef530e5f4c57d1a28b37886
-
SHA512
4de0d67afb093bc4217ee20e0a39718a37c97b9745ef989c25af1c47937838f4f445e3aca85bc4e680641538e3476e5a0e739fdae5b99057cfc21124c581064b
-
SSDEEP
6144:SMoZb0Bt2qbSNj/DNYX0X9KsJHE9EcrupR70yo+NfH:fobg2qbSNj/DNnV+EcrIR/fH
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\360svc\Parameters\ServiceDll = "C:\\Documents and Settings\\Local User\\ntuser.dll" 71a3f29f7526efc9c399e89927a32ab6_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 436 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 436 svchost.exe -
resource yara_rule behavioral2/memory/2800-0-0x0000000000400000-0x000000000047F000-memory.dmp vmprotect behavioral2/memory/2800-3-0x0000000000400000-0x000000000047F000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71a3f29f7526efc9c399e89927a32ab6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2800 71a3f29f7526efc9c399e89927a32ab6_JaffaCakes118.exe 2800 71a3f29f7526efc9c399e89927a32ab6_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a3f29f7526efc9c399e89927a32ab6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\71a3f29f7526efc9c399e89927a32ab6_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD5978f2cc4bd31840938af5501a6056d16
SHA120bd51a25600f17d14b785ad49b623204428a289
SHA2561fb03412620de628bf0b3669c64e851a9e50a14b4c03a383eb8f714a983c962c
SHA5122fc896d96a5a9c24cbafba37f1a178c53b64d1cb996380793a0182c2567a323ea806f489b0fa51ea885b4722f7f070301f583c3e0b116f9f5e92fd59ee75dc97