Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe
-
Size
253KB
-
MD5
8c528b50796053319916cc3758f7d3f1
-
SHA1
0bb99b6b280616a490648606dcba4f0ce6b16fcf
-
SHA256
13894d0a49af6483baf3fd2cf72e43cd18f7823b5ed42fd36df7c655fe579b28
-
SHA512
e0171b625a02b0c0351c62a016398fd5df2f39fc931e31e239905aa759951c4785610c219f932b10bd40c5fe8a4ef8e7a5592d11273954755322541e9ccf3760
-
SSDEEP
6144:53UaFS58Q+Sij0nVGtnQfNmPvwQ5rQidwByQotV:535E2FjTnOCIQ5rn3QoP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\8C528B~1.EXE," 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8C528B~1.EXE" 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\111cb424 = "Cjm\x19\u008d¤2k\x04·\x1cY\nŸôâ4ÄwX2hº\fS‹Í,ÜíÉ\x1d\x1e\x7fžå.AhÁ1\x1cg\x0fßã¡ÒèXÉ\"é-÷bʤìö\x1eߤ\x13U\x1aÃKr¨R—³Ms\róš\x11بI®î8S\x1cû¨Ö¹¤+¡\v\x13Ž\b#‹áAHø(Cù趹°(\x01©cùN\bœ\bpˆ9ûÃiä\u0090ì\x01l \x0e޻˘S\x04¶{«Ãa€aÛ¦Àö(.ùΫPpËk”&a¬¸\x04\x10!p+ä–y[àÖSÑ\x13³æyœ\tf°#0C\x10\x10À¦dÐy™¤\x11Ю¦\bP3\x16¾ƒ\x14v€X\x1c‘ÉÑ\x14ȱ$\b01Ññ\u0090¡)ÁKŽ\v3^\f![V±”\u0081éÎÞÓCø¬PhóÖ;x" 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8C528B~1.EXE" 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe Token: SeSecurityPrivilege 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe Token: SeSecurityPrivilege 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe Token: SeSecurityPrivilege 3012 8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c528b50796053319916cc3758f7d3f1_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012