Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe
-
Size
277KB
-
MD5
9476c274073635be6bfa1cdd4b120bc7
-
SHA1
99e66d8457e09181ad83b470a0a6fc316e488f67
-
SHA256
fee3705df6367e0f26d12eceb184caea38e7e90d3eea852b66922a3323961203
-
SHA512
37916da79c78a638bf403cab7f99b646e5e3c29a713a324ebf6a9d57dce6829b51f61c1ab7bdfe423a331b6654b27b342b5fad0f87eeaf27d2d714947316db4e
-
SSDEEP
6144:X1TnDzopfUxko17BX/ECry0Eya7dSYl0Od/P+9:X1TDeo59EgUgYl08+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\9476C2~1.EXE," 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9476C2~1.EXE" 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ea17ed3a = "BŒ·È[–´J9¨T-Ð\x02Êì\x14¡½(-:po$¦éç1‘Î\x06!šâHª\x0eª×\"\x0f¾l0ëïxJÈ—\n-ú\b°!d,÷¸\x1e\x04\x13î\f¢ó\u00ad\u00adCéŠ$“\x16ˆ°\a-Ï%»0µóÞ\r¡l\x1bUXíi¹|\x15i\u0081Ù¨xŒ`1íž&ÅÖ¶øÝÔ=[ý)õ\u0090¡ë‰ùí\x13dY•\x03E;ÛQaV6µÃÅ\x04`Ñud®ãáh\r¹Á\bÈé€Uyù\x1c`1£åÃó\x18x8‰\u00adÅáu°ùÙ![½„UI\x11U¾Tãó†ã\x01…™\x19EÄùÉ9I‰½ŒÎ\x05!©™)Æ\u009dñqÍô}¼½UDù\x13\x1b™V¸éí½†\x14[UEå\rΨÝ\x19‰«³myLsíÝ\x1b¦}¸\t\x03é$‘" 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\9476C2~1.EXE" 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe Token: SeSecurityPrivilege 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe Token: SeSecurityPrivilege 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe Token: SeSecurityPrivilege 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3960 9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9476c274073635be6bfa1cdd4b120bc7_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3960
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=3888 /prefetch:81⤵PID:224