Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe
-
Size
234KB
-
MD5
ab479db9386c0a47f062067a9ebd5d6e
-
SHA1
4fd23d9f39c042d2fa32769606019b0ec9970ad8
-
SHA256
f9da3485a894c135a113b57d1cf760aaae3d588c5614802c6e2a2131d904405f
-
SHA512
a9e3496aa835c2fba8fbbcffb3e211b72889abe039d5cf490000cbed593ada717be476355f0359c6fbaae7b7967797fa374399d18e81bbd5e30f47729bce36f6
-
SSDEEP
6144:zHl0ndECgkCAaRLkubNawb9VOExRCiMOEo:BOHCAIL9bswb9VOExxLE
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Wmi\Parameters\ServiceDll = "C:\\Windows\\system32\\Wmi.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\helpsvc\Parameters\ServiceDll = "C:\\Windows\\system32\\helpsvc.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Nwsapagent\Parameters\ServiceDll = "C:\\Windows\\system32\\Nwsapagent.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LogonHours\Parameters\ServiceDll = "C:\\Windows\\system32\\LogonHours.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PCAudit\Parameters\ServiceDll = "C:\\Windows\\system32\\PCAudit.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WmdmPmSp\Parameters\ServiceDll = "C:\\Windows\\system32\\WmdmPmSp.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\uploadmgr\Parameters\ServiceDll = "C:\\Windows\\system32\\uploadmgr.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SRService\Parameters\ServiceDll = "C:\\Windows\\system32\\SRService.dll" ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe -
Loads dropped DLL 48 IoCs
pid Process 3932 svchost.exe 3932 svchost.exe 3932 svchost.exe 3840 svchost.exe 3840 svchost.exe 3840 svchost.exe 4588 svchost.exe 4588 svchost.exe 4588 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 2768 svchost.exe 1448 svchost.exe 1448 svchost.exe 1448 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 3844 svchost.exe 3844 svchost.exe 3844 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 4008 svchost.exe 4008 svchost.exe 4008 svchost.exe 5036 svchost.exe 5036 svchost.exe 5036 svchost.exe 3192 svchost.exe 3192 svchost.exe 3192 svchost.exe 3192 svchost.exe 3192 svchost.exe 3192 svchost.exe 4476 svchost.exe 4476 svchost.exe 4476 svchost.exe 4476 svchost.exe 4476 svchost.exe 4476 svchost.exe -
Drops file in System32 directory 14 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WmdmPmSp.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\LogonHours.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PCAudit.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\uploadmgr.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ias.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SRService.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nla.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\helpsvc.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Nwsapagent.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Wmi.dll ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1768 ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe 1768 ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab479db9386c0a47f062067a9ebd5d6e_JaffaCakes118.exe"1⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3932
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3840
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4588
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2768
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1448
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1708
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3844
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2620
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4008
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5036
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3192
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD547126ac9427903fdf67c8c71d5612cab
SHA12acbb4133eccb2bffc96bc092ee553222b12b974
SHA256447c28e2f51548ae6bdf5161538ddd0fd700aa50f026340c7105f26f52559b8c
SHA512d85122d4f555f09bbab8a6a0dd12bb9301fe81ca187aeef2833b4fc6042e638927a098197461e7da157fccd48eb1950862736a5ea71175ba353df06ae903d86d