Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe
-
Size
52KB
-
MD5
87cc11306fa0823ef90af7aa97dc43f7
-
SHA1
c9410407f5d01cf0823fbd710c54beca1be39ced
-
SHA256
1aaae5d8194f49ae5f0d6178ae5d64a74568dd2821e3b68c50f799a0cabfff2e
-
SHA512
977a6b6b94ca5f0f5ba22d10a9d34cf5049e5420f806aea8404670b8b92217fb1c45ef7ed803663cdafdc6b098146ccf0236c324862f2cd0c932efa9014078ab
-
SSDEEP
768:S4EZAy6a2UTXlW9k8cb1A8AHFyKGzrvApxJhHTYcfnFJeyv58n:S4e6a2aVW9k8s1SkProp5vvF8yB4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2708 svchost.exe 3628 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\L: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1980 set thread context of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 2708 set thread context of 3628 2708 svchost.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1980 wrote to memory of 1836 1980 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 85 PID 1836 wrote to memory of 2708 1836 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 91 PID 1836 wrote to memory of 2708 1836 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 91 PID 1836 wrote to memory of 2708 1836 87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe 91 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93 PID 2708 wrote to memory of 3628 2708 svchost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\87cc11306fa0823ef90af7aa97dc43f7_JaffaCakes118.exe2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe4⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3628
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD587cc11306fa0823ef90af7aa97dc43f7
SHA1c9410407f5d01cf0823fbd710c54beca1be39ced
SHA2561aaae5d8194f49ae5f0d6178ae5d64a74568dd2821e3b68c50f799a0cabfff2e
SHA512977a6b6b94ca5f0f5ba22d10a9d34cf5049e5420f806aea8404670b8b92217fb1c45ef7ed803663cdafdc6b098146ccf0236c324862f2cd0c932efa9014078ab