Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe
-
Size
139KB
-
MD5
a9ee9939d46efe286708b9283280e39a
-
SHA1
67962c4adead5ed7c353ae17308d9ad1e1722b05
-
SHA256
d59692b6b2068e3e889d115b0870646194f9b1166dc9fd7fa8626017b6c4bd30
-
SHA512
4c2a3e2cf68b0dc5d5feb9305e27657cc995206e05187712e3c36796e8fc50a86052aab4eb7b7b1dd2fa33f7554b7e8f835eac8937be6e25767ce8de32e18a25
-
SSDEEP
1536:xbyWHRHOmj4EkRKoM16gDZyL5EVhAnGqqqqqq1qqqqqVAptsm0haGbydJiEWl/is:hbHRLj48oM11Xhx10ha2qrngPY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 964 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 2680 csrss.exe 2644 csrss.exe -
resource yara_rule behavioral2/memory/4776-0-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/4776-2-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/4776-4-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/4776-26-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-30-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-32-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-35-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-36-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-37-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-38-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-41-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-44-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-48-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/2644-49-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\csrss.exe\"" csrss.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2092 set thread context of 4776 2092 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 87 PID 2680 set thread context of 2644 2680 csrss.exe 93 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4776 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 2644 csrss.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2092 wrote to memory of 4776 2092 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 87 PID 2092 wrote to memory of 4776 2092 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 87 PID 2092 wrote to memory of 4776 2092 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 87 PID 2092 wrote to memory of 4776 2092 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 87 PID 2092 wrote to memory of 4776 2092 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 87 PID 2092 wrote to memory of 4776 2092 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 87 PID 2092 wrote to memory of 4776 2092 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 87 PID 2092 wrote to memory of 4776 2092 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 87 PID 4776 wrote to memory of 964 4776 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 88 PID 4776 wrote to memory of 964 4776 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 88 PID 4776 wrote to memory of 964 4776 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 88 PID 4776 wrote to memory of 2680 4776 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 90 PID 4776 wrote to memory of 2680 4776 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 90 PID 4776 wrote to memory of 2680 4776 a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe 90 PID 2680 wrote to memory of 2644 2680 csrss.exe 93 PID 2680 wrote to memory of 2644 2680 csrss.exe 93 PID 2680 wrote to memory of 2644 2680 csrss.exe 93 PID 2680 wrote to memory of 2644 2680 csrss.exe 93 PID 2680 wrote to memory of 2644 2680 csrss.exe 93 PID 2680 wrote to memory of 2644 2680 csrss.exe 93 PID 2680 wrote to memory of 2644 2680 csrss.exe 93 PID 2680 wrote to memory of 2644 2680 csrss.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\csrss.exe" CityScape Enable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:964
-
-
C:\Users\Admin\AppData\Roaming\csrss.exe/d C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\csrss.exe/d C:\Users\Admin\AppData\Local\Temp\a9ee9939d46efe286708b9283280e39a_JaffaCakes118.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139KB
MD5bfff4accb83512cf122f6e8ba3eb0f2d
SHA1b5cd2bbddd29ef8a33481249ff900dcf8c4e5faf
SHA256387a09217140b10559b4a5c17976bcce92a22e5a8850e06e80cb56084b9b99a9
SHA512de89708f8115bf65e71c2404adf32d92025d7f24e01c968a03ed624e43ded37fff372f7971d5c3f58f977f74f794f3cd076fab2ef1cb7c49ffb02847bc5e84c1