Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe
-
Size
236KB
-
MD5
a14124a3f85e4b827de7fc26f3f8a486
-
SHA1
297681b8de6ba22ddadae836772f41126565dc77
-
SHA256
1f3f62f463864cf4ed2d35f3d2b2d3ed1cf6a38c206bf19b5f3227496a4eb19f
-
SHA512
c4eff1395ff4321a09791f8581f0e86f2d72ce968a3da779ab9ce94f70b2e0ab830d340a10993fa0d3e241326269f021f78223e8ce4e5cd81d88b735b7ebdebd
-
SSDEEP
6144:hZiKocSHVJgztFoJqu4rspWcDXH4xU38PYuHSnzvQ/+:ijbHV2ZspbDXYxq8wuMzvV
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\Legacy VGA Drivers V1.0 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\Legacy VGA Drivers V1.0\StubPath = "C:\\Windows\\certproc32.exe" a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\Legacy VGA Drivers V1.0 certproc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\Legacy VGA Drivers V1.0\StubPath = "C:\\Windows\\certproc32.exe" certproc32.exe -
resource yara_rule behavioral2/files/0x00080000000234cb-26.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4784 certproc32.exe -
Loads dropped DLL 1 IoCs
pid Process 4784 certproc32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Legacy VGA Drivers V1.0 = "C:\\Windows\\certproc32.exe" a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Legacy VGA Drivers V1.0 = "C:\\Windows\\certproc32.exe" certproc32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\certproc32.exe a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe File created C:\Windows\jtcres32.dll certproc32.exe File created C:\Windows\mapisrv32.dll certproc32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certproc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4784 certproc32.exe 4784 certproc32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2924 wrote to memory of 4784 2924 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 96 PID 2924 wrote to memory of 4784 2924 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 96 PID 2924 wrote to memory of 4784 2924 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 96 PID 2924 wrote to memory of 4384 2924 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 98 PID 2924 wrote to memory of 4384 2924 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 98 PID 2924 wrote to memory of 4384 2924 a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe 98 PID 4784 wrote to memory of 3480 4784 certproc32.exe 56 PID 4784 wrote to memory of 3904 4784 certproc32.exe 100 PID 4784 wrote to memory of 3904 4784 certproc32.exe 100 PID 4784 wrote to memory of 3904 4784 certproc32.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a14124a3f85e4b827de7fc26f3f8a486_JaffaCakes118.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\certproc32.exe"C:\Windows\certproc32.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵PID:3904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A14124~1.EXE>> NUL3⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5a14124a3f85e4b827de7fc26f3f8a486
SHA1297681b8de6ba22ddadae836772f41126565dc77
SHA2561f3f62f463864cf4ed2d35f3d2b2d3ed1cf6a38c206bf19b5f3227496a4eb19f
SHA512c4eff1395ff4321a09791f8581f0e86f2d72ce968a3da779ab9ce94f70b2e0ab830d340a10993fa0d3e241326269f021f78223e8ce4e5cd81d88b735b7ebdebd
-
Filesize
226KB
MD5e9326b68533f7ca45c0c7a98ffeacc48
SHA12beaf06644e7d7c0834d217cedf681fe85f8dc6b
SHA25622d9ae4a5f5730616c18e1f2088784ebe5e26e83d9ebf555a114c225380d4671
SHA512d0f42c8e08c26d7d5c8fed534d9102c876f0364e63c5ad3c61efff8ac36e07d175d19d8aa80c12c00fcbff3969170f2e34717ab58546800c2669de1d91147433