Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe
-
Size
89KB
-
MD5
95e76c242eadbaf1d75503d46482c8ca
-
SHA1
d85e6e881ef477ea6111c85d80a5e2af8986cbbd
-
SHA256
6b58e0a021bf4e2ab87aec4e40b3415ee313d7d1d24be6d413334ec6f4ff0c26
-
SHA512
1bbd5cd879f2db2cd8414035996f04327e931ca65e0b127de0c553e2c0a25aacb3041eaac2a6103592d8a9d3c0744bd00283c75af765e274f92b620cffabe9ad
-
SSDEEP
768:MrFPx8ceViHNaZyiJHFlnjSSO3c1boD9d9rA49U6n1hPLJ890GMkJ5z9o6je4K6m:MByKNaZXWYEi4K6nPMbLRoMe4KBd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\ProgramData\\DownloadSave\\geolvok.exe" geolvok.exe -
Deletes itself 1 IoCs
pid Process 3908 geolvok.exe -
Executes dropped EXE 2 IoCs
pid Process 3908 geolvok.exe 804 geolvok.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\N: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\L: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\K: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\H: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\E: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\X: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\W: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\O: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\B: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\M: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\I: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\Z: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\Y: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\V: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\T: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\S: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\P: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\G: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\R: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\Q: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe File opened (read-only) \??\J: 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geolvok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language geolvok.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4944 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe 4944 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3908 geolvok.exe Token: SeIncBasePriorityPrivilege 804 geolvok.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4944 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 3908 geolvok.exe 804 geolvok.exe 804 geolvok.exe 3908 geolvok.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3908 4944 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe 85 PID 4944 wrote to memory of 3908 4944 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe 85 PID 4944 wrote to memory of 3908 4944 95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe 85 PID 3908 wrote to memory of 804 3908 geolvok.exe 86 PID 3908 wrote to memory of 804 3908 geolvok.exe 86 PID 3908 wrote to memory of 804 3908 geolvok.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95e76c242eadbaf1d75503d46482c8ca_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\ProgramData\DownloadSave\geolvok.exe"C:\ProgramData\DownloadSave\geolvok.exe"2⤵
- Modifies WinLogon for persistence
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\ProgramData\DownloadSave\ geolvok.exe"C:\ProgramData\DownloadSave\ geolvok.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260B
MD5afa19469d1bc271f1409fc50d3559ad6
SHA1234bcf5b96b1099018f3d182b99045440ef5275f
SHA256051c9b48e10495090a510f0047693f5341752ba7cf3b84423da9629fd10aa4d2
SHA5125eb6064888abcaf48c448b98393c914f75ed13f249cc03e2df867c1266972b965343278974f7ae6087ea493ae974bf47d0171cc92cf2abdb8d46e10ecda53d4c
-
Filesize
89KB
MD595e76c242eadbaf1d75503d46482c8ca
SHA1d85e6e881ef477ea6111c85d80a5e2af8986cbbd
SHA2566b58e0a021bf4e2ab87aec4e40b3415ee313d7d1d24be6d413334ec6f4ff0c26
SHA5121bbd5cd879f2db2cd8414035996f04327e931ca65e0b127de0c553e2c0a25aacb3041eaac2a6103592d8a9d3c0744bd00283c75af765e274f92b620cffabe9ad