Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe
-
Size
4.0MB
-
MD5
aaa6ce5c677b3c38cfb9f6d4e2d9f878
-
SHA1
153178bd2e909c827b5c8f74ac8f464247ed4314
-
SHA256
d531bb88f09d76a70b36d9ef4790a736dc4c0d6ba3a63187c228fc982b533c95
-
SHA512
164f0b28794e527c97220ad6b89a462f3fe17c061f8f93052097439965877ec15eb631197a2e82b97b50b5ec750b7dd0a90584ba4b1f261dfd39f8605c8ba42d
-
SSDEEP
98304:NhSf5W8Brs1+4afc3Ty1rXm+4p7hsSnl+pUo6IXp6:bGhBs1Zk7z4p7uSn1a8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5080 _B6EC.tmpac7d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\o6jeknuvdno0 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe" aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Security Monitor = "\"C:\\Users\\Admin\\AppData\\Roaming\\Security Monitor\\Security Monitor.exe\" /STARTUP" aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3424 4908 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _B6EC.tmpac7d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4908 aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4908 aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 5080 4908 aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe 84 PID 4908 wrote to memory of 5080 4908 aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe 84 PID 4908 wrote to memory of 5080 4908 aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aaa6ce5c677b3c38cfb9f6d4e2d9f878_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\_B6EC.tmpac7d.exe"C:\Users\Admin\AppData\Local\Temp\_B6EC.tmpac7d.exe" -p"09:03 PM" -y -o"C:\Users\Admin\AppData\Roaming\Security Monitor"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 8962⤵
- Program crash
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4908 -ip 49081⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5be76e3051c9d0d20fea5699195e77305
SHA12098c8ca26ddb73839b5fbf7c24924a3f47ebfff
SHA256be21bc17c1f9bf15b199dca63abe20d9ea8bc01a2e4e870185ac08dfd81f7ff0
SHA51288d2ba128fe376430624624bb9b94f8dc8104531f1d56b77cf77a7a007e62fe6aa783def0861b46b3f790d30b8a1b4083e2bdd2c68522b8add1bf15e82076c4b