Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe
-
Size
89KB
-
MD5
88cfd907476565087e1747e70bf638b0
-
SHA1
d1d95d8afd5492f8fe9cd411627224d4ebcbe724
-
SHA256
9596b8425d215fb1ce3b70064dfbf2a94dd1b988dc96bdd5f47d3cb3bdc4ed4c
-
SHA512
582324ad62e433b886f8fe65d5c047c9c9b787b195eae0fafe726d48c8c3d51133ecce24d69d3f95f645bf5c6c8544ee7c6cc4b8b82bef69a13a9b42dcd3dbb0
-
SSDEEP
1536:Ev8jkIB0yIB3J5GlqWo5QljUzgYeBmdDe7+oaI5zjpaEK759+wTEO8vppoVx:E8V0yIB5wlpo5kIGBmdDQ+rI5zlalX+G
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe -
Loads dropped DLL 36 IoCs
pid Process 828 svchost.exe 828 svchost.exe 828 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2776 svchost.exe 2776 svchost.exe 2776 svchost.exe 4664 svchost.exe 4664 svchost.exe 4664 svchost.exe 2756 svchost.exe 2756 svchost.exe 2756 svchost.exe 2836 svchost.exe 2836 svchost.exe 2836 svchost.exe 3984 svchost.exe 3984 svchost.exe 3984 svchost.exe 2744 svchost.exe 2744 svchost.exe 2744 svchost.exe 2692 svchost.exe 2692 svchost.exe 2692 svchost.exe 1616 svchost.exe 1616 svchost.exe 1616 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 960 svchost.exe 960 svchost.exe 960 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nla.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ias.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SRService.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2872 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe 2872 88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\88cfd907476565087e1747e70bf638b0_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:828
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2344
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2776
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4664
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2756
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2836
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3984
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2744
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2692
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1616
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1704
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD58c16469c3aef3f17ff9ae3a2b78da236
SHA1d610a17093e24400fb9e2e0dcd01e51344febc26
SHA25615291c9e4900059195fe26fa7f968e042ac30520d2df557fcd9f1e208ecebe98
SHA512b485b5d732b1a068264a758983eb4c5168c922b94918d92484cf557b6ca057829df163da26ae41c5e18ee4444af5ed37aaab20ef49f98abe15c6694e78e60209