Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 00:36
Behavioral task
behavioral1
Sample
884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe
-
Size
51KB
-
MD5
884fa6f68ebc37e897c4a7d7bb32a75f
-
SHA1
011601fcb414846d72e7bcf3973ce0248e7ed35e
-
SHA256
738cbb5e4c08c9e0384206c297ebb207dd8a64cce51ffaba62cce84053a92b75
-
SHA512
61b33063b2673f5bd700b9c32aa0c3204002670ebb24b202fec5226650b23741db27e24a073894accb572417eb655d8cf43ca6bbce3b375119b5c7ac0b5a8c18
-
SSDEEP
1536:E5urmX2eZwS2N6XG9IgTwHZ6ioZWZ3um4:B5yw6XG9fwXoZWt54
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\ewjzj.sys 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\ewjzj.sys 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\cldairb\ImagePath = "system32\\drivers\\ewjzj.sys" 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 3344 rundll32.exe 2180 Rundll32.exe -
resource yara_rule behavioral2/memory/2416-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2416-12-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\PAJL.dll 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PAJL.dll 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe File created C:\Windows\SysWOW64\d5v5uA.bat 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1928 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1928 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 Rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2416 wrote to memory of 3344 2416 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 84 PID 2416 wrote to memory of 3344 2416 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 84 PID 2416 wrote to memory of 3344 2416 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 84 PID 3344 wrote to memory of 2180 3344 rundll32.exe 85 PID 3344 wrote to memory of 2180 3344 rundll32.exe 85 PID 3344 wrote to memory of 2180 3344 rundll32.exe 85 PID 2416 wrote to memory of 3292 2416 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 86 PID 2416 wrote to memory of 3292 2416 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 86 PID 2416 wrote to memory of 3292 2416 884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe 86 PID 3292 wrote to memory of 1928 3292 cmd.exe 88 PID 3292 wrote to memory of 1928 3292 cmd.exe 88 PID 3292 wrote to memory of 1928 3292 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\884fa6f68ebc37e897c4a7d7bb32a75f_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\PAJL.dll,DllRegisterServer2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\Rundll32.exeC:\Windows\system32\Rundll32.exe C:\Windows\system32\PAJL.dll,DllUnregisterServer3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\d5v5uA.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD57179274e6d4a7c756fd958ade00c9a04
SHA1749ffec6f026b503801c6dbd2380d541b7393217
SHA25636af8a5a3e032200bfba17b5533b103751d1db0d4b1245fc6392df1db0e70652
SHA512ab19fa4c2a7135f124e7ffa2c500f19aa8afff39405b6d171879e622dd1a5165f3adf195c556d7a6aec637886c05333f40e1293b9c21eb6e1bfcb685c967bfb7
-
Filesize
249B
MD5caa3b942e5f256e0e5d5e391eba60c77
SHA1494e330f34949425c05677b7c3f40eba00fd67b1
SHA2561f478625c0d307ace713724f213febce675522e28f31674f2668913dc72ada9c
SHA512a0a34e2021e4ce7858e0941dde7d21f465aceb6b1cf9151242f35e70ce12ef1a4ba6438a4caaf78c8b662822c0e41721930d52a8994093bcb890a65cf6a46051