Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe
-
Size
40KB
-
MD5
75c985a2deee1d98b2e26a07fe35ea1b
-
SHA1
ce2d092ca8fb1f44802d1860a0145ea984678af2
-
SHA256
ca62468ca46de3d3fa7a501ae00bc70aeb682a4098652934a1a450674eac0001
-
SHA512
56030053cb07db3b4dc08951f31a54a1927e6445c6b3914156b88b000730c808070dc012719134112e0b31bf0eb2b365eabf486043d4a806ec51b2aab83703a1
-
SSDEEP
768:/mVG2CkCYL8gJMuaaxxpKBKYxvbB6ogA2LsNNSsIcp:/mVG2CkCYL8gauxLpgxvso7Dbp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1836 WinHe802.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHe802.exe 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinHe802.exe 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe File created C:\Windows\SysWOW64\WinHe802.exe WinHe802.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHe802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4244 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1836 WinHe802.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4244 wrote to memory of 1836 4244 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe 87 PID 4244 wrote to memory of 1836 4244 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe 87 PID 4244 wrote to memory of 1836 4244 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe 87 PID 4244 wrote to memory of 3444 4244 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe 88 PID 4244 wrote to memory of 3444 4244 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe 88 PID 4244 wrote to memory of 3444 4244 75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe 88 PID 1836 wrote to memory of 4724 1836 WinHe802.exe 89 PID 1836 wrote to memory of 4724 1836 WinHe802.exe 89 PID 1836 wrote to memory of 4724 1836 WinHe802.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\75c985a2deee1d98b2e26a07fe35ea1b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\WinHe802.exe"C:\Windows\system32\WinHe802.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Windows\SysWOW64\WinHe802.exe > nul3⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Temp\75C985~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.3MB
MD59c45d9127e1b109614fc049abd59067e
SHA16c5dbd36e7527ac0a98515ce31613e450dc107e8
SHA256b3ed20d637a5d232b83183a0ec638f5aad7a78c22ec7d47b012906d3e5786cac
SHA512d9066b64a8d4e3ad1cf90c5c2bb74231bf10e26787ce4db3cbd75c337455657dc5b10b004491846290da243eec0b21920c527176fe146804478bef476bdac11d