Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 04:15
Behavioral task
behavioral1
Sample
82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
82feaf4427aff3dbad0a259b45bff63d
-
SHA1
f1ca08e6a0866b42e3f7ed7c2e1e1d3ad7a5ceac
-
SHA256
9a5bdddfeddbfaf15804092d2dd4c0f0edf84ca91781a57ef87a24e2e53c0f31
-
SHA512
a196d170e7e17b7fbb249bb150cdf088e951183a97687786dbd6935039518b06527be69f7d6c79323f373f8a6d68b0a25c572f5f97962fd40b117a14f777e498
-
SSDEEP
98304:MDHEfh0QVKtQkgC22K2uJ6AOsmKC81PBTcGcqpXmw8VSfVN7G97BmONSciOi2:m8atgujKC81PBIGcZcNN2EciO/
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4724 netsh.exe -
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
resource yara_rule behavioral2/memory/2580-0-0x0000000000400000-0x0000000000B64000-memory.dmp upx behavioral2/files/0x00080000000234e5-4.dat upx behavioral2/memory/2580-14-0x0000000000400000-0x0000000000B64000-memory.dmp upx behavioral2/memory/2580-16-0x0000000000400000-0x0000000000B64000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GbpSv = "C:\\windows\\system\\Plugin.exe" 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\A_0001.txt 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe File created C:\Windows\SysWOW64\Partizan.RRI 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\windows\system\Plugin.exe 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1652 sc.exe 2496 sc.exe 2640 sc.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3208 schtasks.exe 4044 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2580 wrote to memory of 4724 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 85 PID 2580 wrote to memory of 4724 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 85 PID 2580 wrote to memory of 4724 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 85 PID 2580 wrote to memory of 3208 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 87 PID 2580 wrote to memory of 3208 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 87 PID 2580 wrote to memory of 3208 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 87 PID 2580 wrote to memory of 4044 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 89 PID 2580 wrote to memory of 4044 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 89 PID 2580 wrote to memory of 4044 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 89 PID 2580 wrote to memory of 2496 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 90 PID 2580 wrote to memory of 2496 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 90 PID 2580 wrote to memory of 2496 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 90 PID 2580 wrote to memory of 4088 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 91 PID 2580 wrote to memory of 4088 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 91 PID 2580 wrote to memory of 4088 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 91 PID 2580 wrote to memory of 3000 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 92 PID 2580 wrote to memory of 3000 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 92 PID 2580 wrote to memory of 3000 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 92 PID 2580 wrote to memory of 3412 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 93 PID 2580 wrote to memory of 3412 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 93 PID 2580 wrote to memory of 3412 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 93 PID 2580 wrote to memory of 4504 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 94 PID 2580 wrote to memory of 4504 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 94 PID 2580 wrote to memory of 4504 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 94 PID 2580 wrote to memory of 628 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 95 PID 2580 wrote to memory of 628 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 95 PID 2580 wrote to memory of 628 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 95 PID 2580 wrote to memory of 1652 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 96 PID 2580 wrote to memory of 1652 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 96 PID 2580 wrote to memory of 1652 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 96 PID 2580 wrote to memory of 2640 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 97 PID 2580 wrote to memory of 2640 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 97 PID 2580 wrote to memory of 2640 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 97 PID 2580 wrote to memory of 2812 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 100 PID 2580 wrote to memory of 2812 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 100 PID 2580 wrote to memory of 2812 2580 82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe 100 PID 628 wrote to memory of 3088 628 net.exe 109 PID 628 wrote to memory of 3088 628 net.exe 109 PID 628 wrote to memory of 3088 628 net.exe 109 PID 4504 wrote to memory of 2956 4504 net.exe 110 PID 4504 wrote to memory of 2956 4504 net.exe 110 PID 4504 wrote to memory of 2956 4504 net.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82feaf4427aff3dbad0a259b45bff63d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\windows\system\Plugin.exe RPCCC2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn balada /tr c:\autoexec.bat /sc onstart /ru system2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3208
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\start.bat /sc onstart /ru system2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4044
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
- System Location Discovery: System Language Discovery
PID:3000
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
- System Location Discovery: System Language Discovery
PID:3412
-
-
C:\Windows\SysWOW64\net.exenet start GbpSv2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start GbpSv3⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
C:\Windows\SysWOW64\net.exenet stop GbpSv2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop GbpSv3⤵
- System Location Discovery: System Language Discovery
PID:3088
-
-
-
C:\Windows\SysWOW64\sc.exesc stop GbpSv2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\sc.exesc config GbpSv start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\autoexec.bat2⤵
- System Location Discovery: System Language Discovery
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD582feaf4427aff3dbad0a259b45bff63d
SHA1f1ca08e6a0866b42e3f7ed7c2e1e1d3ad7a5ceac
SHA2569a5bdddfeddbfaf15804092d2dd4c0f0edf84ca91781a57ef87a24e2e53c0f31
SHA512a196d170e7e17b7fbb249bb150cdf088e951183a97687786dbd6935039518b06527be69f7d6c79323f373f8a6d68b0a25c572f5f97962fd40b117a14f777e498
-
Filesize
6KB
MD53c4efbf13ceeb379b1a102ca466048cd
SHA1cd038f0fe0747102bf0568a9eafc139fb63b7e8b
SHA2561156730d23bd9460f2b577176b8960df0cffe15a72c7df0b1da6ddb13ce6e995
SHA51268f7085a2f3d24a543b25029fa83cfff1ed05f63a99155cecbb4cdc0b9b26354f4d48b08256c5a5212ce319467b23fa6804e9f8d67a81c4231d444ffe1eac320