Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe
-
Size
409KB
-
MD5
84a153feb0c613fc291fd7193182ca1f
-
SHA1
1e0a75ef9167d89b7bcbf1cd8461b105c87471d5
-
SHA256
572efcf858a95bc19f5aeae51ac834c007e92902ff8b96d9dac588162374e72e
-
SHA512
0cc7d2ec26832be7dfb55372778404699e7a3a3188e4a211b66ec70c01fdc7c3b8ddbf468b4c9c01e6015ea639e62adb78197b1cdc77f4f607cdcbaa6ee7fc34
-
SSDEEP
6144:LUA/ePHC1kZx0rtc0K0F2idZecnl20lHRxp3gnR7LN9qcUZ3uRBmbpOo9:o961IPzUF3Z4mxxwVn1Y3isEo9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2704 uninst.exe -
Loads dropped DLL 2 IoCs
pid Process 2704 uninst.exe 4544 svchost.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\uninst.dll 84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe File created C:\Windows\SysWOW64\uninst.dat uninst.exe File created C:\Windows\SysWOW64\uninst.exe uninst.exe File opened for modification C:\Windows\SysWOW64\uninst.exe uninst.exe File opened for modification C:\Windows\SysWOW64\uninst.dll uninst.exe File created C:\Windows\SysWOW64\uninst.exe 84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uninst.exe 84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe File created C:\Windows\SysWOW64\uninst.dll 84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninst.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1360 84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe Token: SeDebugPrivilege 2704 uninst.exe Token: SeDebugPrivilege 4544 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1360 wrote to memory of 2516 1360 84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe 88 PID 1360 wrote to memory of 2516 1360 84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe 88 PID 1360 wrote to memory of 2516 1360 84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe 88 PID 2704 wrote to memory of 4544 2704 uninst.exe 89 PID 2704 wrote to memory of 4544 2704 uninst.exe 89 PID 2704 wrote to memory of 4544 2704 uninst.exe 89 PID 2704 wrote to memory of 4544 2704 uninst.exe 89 PID 2704 wrote to memory of 4544 2704 uninst.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\84a153feb0c613fc291fd7193182ca1f_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\84A153~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\SysWOW64\uninst.exeC:\Windows\SysWOW64\uninst.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD53ed25b82a665186b5f1e4e386ee088c8
SHA1a3b8e5f6aa3d86e82febc13adf7ce82588e4cfda
SHA256cd9afce076e3de0bc5d37e96bd9da6c7520d110df4e0faaa7634a4b59740c168
SHA512911ee4092e46c571703fae9aa1f3d00c9f7a9f220493c240b23323a0cc9971dbbea8ea1a62a2ac2ff3c99eeffdc83f4ea774f8b71196225f70829b76d06e51e9
-
Filesize
136KB
MD51e404228b78bf6e7d10e45c3230bba13
SHA1352b70be3c4dedb67f7d86c52e395621b1180d6c
SHA25629891994b55429140ebe4e6e7305a918212e32d35275769d263eb2d10a0b44b2
SHA512c2ea9cfd4bdcb52f588ad8896a2b207209311f1840a5593e17a3028b8c05919e284e972661d109c3cbd71f626afd4fafa73827a7afa716b619e2c9d20b535ad0
-
Filesize
409KB
MD584a153feb0c613fc291fd7193182ca1f
SHA11e0a75ef9167d89b7bcbf1cd8461b105c87471d5
SHA256572efcf858a95bc19f5aeae51ac834c007e92902ff8b96d9dac588162374e72e
SHA5120cc7d2ec26832be7dfb55372778404699e7a3a3188e4a211b66ec70c01fdc7c3b8ddbf468b4c9c01e6015ea639e62adb78197b1cdc77f4f607cdcbaa6ee7fc34