Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe
-
Size
463KB
-
MD5
9570dfb4575cc4a10791add62e64de24
-
SHA1
9ce4dfac5cd7a09114ea14817866d4ba3ac3073e
-
SHA256
0ac802d9bf8fc8365b4e018be3da13e1ec5f9fe4b57883c9d7875c64f9f354a5
-
SHA512
88c92d8059b92cab068d2a34bb3f3dd471f455cff14dfb6d776860c3fd4b8e5536694c5beebdcc8354f3f8158684b5402ce420dab5c7377d4c07fb0a92a3abcc
-
SSDEEP
12288:Zwax+LBZJT9Z99ljxPh0UsIF5DBIQ7GX74h:I9ZF9DfwrI/DBIQ7GXI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3348 aP28301JpEnP28301.exe -
Executes dropped EXE 1 IoCs
pid Process 3348 aP28301JpEnP28301.exe -
resource yara_rule behavioral2/memory/1440-1-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/1440-2-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1440-14-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1440-15-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3348-18-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3348-17-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3348-26-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3348-33-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\aP28301JpEnP28301 = "C:\\ProgramData\\aP28301JpEnP28301\\aP28301JpEnP28301.exe" aP28301JpEnP28301.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aP28301JpEnP28301.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1440 9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe 1440 9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1440 9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe Token: SeDebugPrivilege 3348 aP28301JpEnP28301.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3348 aP28301JpEnP28301.exe 3348 aP28301JpEnP28301.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1440 wrote to memory of 3348 1440 9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe 86 PID 1440 wrote to memory of 3348 1440 9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe 86 PID 1440 wrote to memory of 3348 1440 9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\ProgramData\aP28301JpEnP28301\aP28301JpEnP28301.exe"C:\ProgramData\aP28301JpEnP28301\aP28301JpEnP28301.exe" "C:\Users\Admin\AppData\Local\Temp\9570dfb4575cc4a10791add62e64de24_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
463KB
MD5b2947e4ab1fd932df378e94c16d77416
SHA1e7cbfa397e1cda98140f8026edc6deeb58410588
SHA256c2ef0baa75df835642fb88cd165e52ad81cff2d66899cdbe5018f9a28be29738
SHA5120c98faa2b44feb39af95c3a30b4cb41a8b58d61090da54c464052c6c228beb8004bbe6bdb8d5f3c2cae2a605fcba75b49c248552921c1b5dabf13154761e4a68