Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
783734faf025af9f96ec3c75a814b932
-
SHA1
27a99d03077e8c837e67e1bcacde05f5beed5552
-
SHA256
b5e9400bade530592eac7c1e27abfbd7a7c5fc818f1f961a13d647b9f7713e34
-
SHA512
761e8ccd0939088933839170e97857d8578240463ba68a74c9f6717c8e6d6762062ba684b1b4cecacfbcd6bf2e1759ab586d7cd43611fdddda0fe99803e9ffe9
-
SSDEEP
49152:mcaGsO9wUwqvjdVyFM545r/mIRvn0udXuZP+uENndqO8xuwqSSBkpllbnW:mDF7dqvjdVyFM545r/mk/0udXuZP+uEV
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4188 dllhost.exe 2124 N3TexViewer Tr 1.1 SqSKo.exe -
Loads dropped DLL 2 IoCs
pid Process 4188 dllhost.exe 4188 dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DLLHost = "\"C:\\Users\\Admin\\AppData\\Roaming\\dllhost.exe\"" reg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4180 4188 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N3TexViewer Tr 1.1 SqSKo.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4904 reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4616 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4616 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4188 dllhost.exe Token: SeIncBasePriorityPrivilege 4616 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4188 dllhost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4188 4616 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 87 PID 4616 wrote to memory of 4188 4616 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 87 PID 4616 wrote to memory of 4188 4616 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 87 PID 4188 wrote to memory of 4004 4188 dllhost.exe 88 PID 4188 wrote to memory of 4004 4188 dllhost.exe 88 PID 4188 wrote to memory of 4004 4188 dllhost.exe 88 PID 4004 wrote to memory of 440 4004 cmd.exe 90 PID 4004 wrote to memory of 440 4004 cmd.exe 90 PID 4004 wrote to memory of 440 4004 cmd.exe 90 PID 440 wrote to memory of 4904 440 cmd.exe 91 PID 440 wrote to memory of 4904 440 cmd.exe 91 PID 440 wrote to memory of 4904 440 cmd.exe 91 PID 4616 wrote to memory of 2124 4616 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 95 PID 4616 wrote to memory of 2124 4616 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 95 PID 4616 wrote to memory of 2124 4616 783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\783734faf025af9f96ec3c75a814b932_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Roaming\dllhost.exeC:\Users\Admin\AppData\Roaming\dllhost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c system.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V DLLHost /D "\"C:\Users\Admin\AppData\Roaming\dllhost.exe\"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V DLLHost /D "\"C:\Users\Admin\AppData\Roaming\dllhost.exe\"" /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 7403⤵
- Program crash
PID:4180
-
-
-
C:\Users\Admin\AppData\Roaming\N3TexViewer Tr 1.1 SqSKo.exe"C:\Users\Admin\AppData\Roaming\N3TexViewer Tr 1.1 SqSKo.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4188 -ip 41881⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD528f4505278ee06a7206d6056903ca5b6
SHA17c882c069096696a15976bee74f0922f81aa38ae
SHA2560f63764b7a66b7436fc4f67d6d8e28a4b844643bb78adc1330a552d8421b8a88
SHA512ca81dae7a6fc531c2fb9170cba6ffe8669b1bd7907396c735c72951e57960070d2c2e668efad714b2391c3f3bfc04efd84fb7046a587d7ddb6b2b5248869dd0c
-
Filesize
780KB
MD5cc52b2c29431f5fda6e2eee9c9a8b099
SHA165772235f02aa6e7213812c276a19cdeee8e7143
SHA256194e8821f67ff5d7f726932ff00cbe993e28ae97ea2b9b3b91417ed5f173bbfe
SHA512ad13372b55abe5d663eb24958f95c8eef7d1759c22b2413414a62ded0898e323458f7723bbd8a0ff2cf2ed93e05898f75456ac1a5b498c2913367111a2098710
-
Filesize
582KB
MD587f2f013ff03c5caac5ba928d54b63b3
SHA188c86f599b53461b863c21c93f66f216995111f9
SHA256707cb25f9be2f339300651b783f54b83f57941dd7380eb15a5b195dc424678da
SHA512a04b5aa005fa7f6901f936ce3de44b0955e641ba00a3ffae2c63e27279c61f119e73c1b684a014dfe9df8570971ac13f1ae57dd77de2a75eebca327de1610626
-
Filesize
457KB
MD52f856ba5cab53b5cdfe4e3cc7ebfc624
SHA104c168d95a32966bf05eb52850a0e6372ad8a7c1
SHA256c71b7742e0f4fbeb55bedf2b41e41225c28cd00c91bd7021c700069c1d24384d
SHA512df5566feb26cfe1a1df9a25c07452e2c6cda773c1b91ce1808cce3244db272b4e445698d5703d6d6b7db98888a1e09840c9d497d61d7974e530571713a6d85d6