Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 13:46
Static task
static1
Behavioral task
behavioral1
Sample
b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe
-
Size
297KB
-
MD5
b7df8182f6cc54ca873b17eab97f1052
-
SHA1
0e278c8e15a078f484b9f4be69c7d393417f60ba
-
SHA256
a2145c3c4de9f579e9e692ec576c8217a2b61ca29bfa767482cb48258e86795b
-
SHA512
2c24eff59e445e0d792c6d42b9e0a7aa18b60b4dd4ec13dce1f140299071ec0c870a3df17f045d673589c0820d70bb223c8eec6b3adc7c415d54418a81607737
-
SSDEEP
6144:9vDB+sclf76BsT+pt4WbMZVnFM80vWReLGNP376PlcwHgMYR:9LB+9lf76GGsV3ReLiK7gbR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4876 WinXPs.com -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\WinXPs.com b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe File created C:\Windows\WinXPs.com b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 220 4056 WerFault.exe 85 2772 4876 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinXPs.com -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WinXPs.com Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" WinXPs.com Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" WinXPs.com Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" WinXPs.com Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" WinXPs.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4056 b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe Token: SeDebugPrivilege 4876 WinXPs.com -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4876 WinXPs.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4156 4876 WinXPs.com 96 PID 4876 wrote to memory of 4156 4876 WinXPs.com 96 PID 4876 wrote to memory of 4156 4876 WinXPs.com 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7df8182f6cc54ca873b17eab97f1052_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 5162⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4056 -ip 40561⤵PID:4524
-
C:\Windows\WinXPs.comC:\Windows\WinXPs.com1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 5162⤵
- Program crash
PID:2772
-
-
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe2⤵PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4876 -ip 48761⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5b7df8182f6cc54ca873b17eab97f1052
SHA10e278c8e15a078f484b9f4be69c7d393417f60ba
SHA256a2145c3c4de9f579e9e692ec576c8217a2b61ca29bfa767482cb48258e86795b
SHA5122c24eff59e445e0d792c6d42b9e0a7aa18b60b4dd4ec13dce1f140299071ec0c870a3df17f045d673589c0820d70bb223c8eec6b3adc7c415d54418a81607737