Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe
-
Size
264KB
-
MD5
8ee5151279f21a802c7c4a35c438559e
-
SHA1
968c2a3637bab54cb8eaf3e5552e42f612ef5786
-
SHA256
c4539628a4b771a1b1276de073b43d9ebf669154c7c89fdb5cc63ec6e3230047
-
SHA512
35688680ec958269b9e764fbec21115b1533d3a99b2fc56f61da4cd132d9e5b63db9c121444d5b79e35b6973980e5809a49e451b73e18f2f2467668af25f91a0
-
SSDEEP
6144:3/nyiyjGgZdQL4MF7w8iigvookK2vhlwfk:vyzl24MRTgb2c8
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Win SVC 32 = "C:\\Program Files (x86)\\Common Files\\Win SVC 32service.exe" 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{K60TF4T6-GE47-AR3M-H9LH-2T09YC0HM05G} 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{K60TF4T6-GE47-AR3M-H9LH-2T09YC0HM05G}\StubPath = "C:\\Program Files (x86)\\Common Files\\Win SVC 32service.exe" 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1640 Win SVC 32service.exe 4768 Win SVC 32service.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win SVC 32 = "C:\\Program Files (x86)\\Common Files\\Win SVC 32service.exe" 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Win SVC 32 = "C:\\Program Files (x86)\\Common Files\\Win SVC 32service.exe" 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Win SVC 32 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\Win SVC 32service.exe 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win SVC 32service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Win SVC 32service.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command Win SVC 32service.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4944 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 1640 Win SVC 32service.exe 4768 Win SVC 32service.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4944 wrote to memory of 1640 4944 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 84 PID 4944 wrote to memory of 1640 4944 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 84 PID 4944 wrote to memory of 1640 4944 8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe 84 PID 1640 wrote to memory of 2620 1640 Win SVC 32service.exe 85 PID 1640 wrote to memory of 2620 1640 Win SVC 32service.exe 85 PID 1640 wrote to memory of 2620 1640 Win SVC 32service.exe 85 PID 1640 wrote to memory of 4768 1640 Win SVC 32service.exe 86 PID 1640 wrote to memory of 4768 1640 Win SVC 32service.exe 86 PID 1640 wrote to memory of 4768 1640 Win SVC 32service.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Program Files (x86)\Common Files\Win SVC 32service.exe"C:\Program Files (x86)\Common Files\Win SVC 32service.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\Win SVC 32service.exe"C:\Users\Admin\AppData\Local\Temp\Win SVC 32service.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5c7fab3f0c3c415d7b1708f0679201af4
SHA12cdb6fd004237fbf8203a0a72b6fd99305d270b4
SHA2568569945915e878d2bed8690466ecd63c125b094770c9df121aa2f21f00e73ef0
SHA5121cb4a99f38a95335ace8278d4ab3f7fd2a1d12920626c4a5251d4c228e8a60291fc1c59d6f635bc61b5660268723d03c760b268386ef7fd4db36b8544fc61b3a
-
Filesize
156KB
MD59482ad828adeb5073a2528961543d970
SHA16af219b44be03684976c66ce1955de2cc94bc7b8
SHA256bd68cfa07378928615a9b74de2b1d331eba23791cbce3d569c19922dee4b11e8
SHA5126b2b03d2a46f911dd5536b96bb8df90e87baedd9b97aeec4058cb7de16ca66dda6eb959ed5a66da7c902833033ac0c7855ebc104a9131d62e01fdc20884a99c8