Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe
-
Size
45KB
-
MD5
b7c49c997c4f6c078602670e28021bc9
-
SHA1
94c10e85dd81e5f21b5f58755ad91046b2409074
-
SHA256
1e6cb8c1bfe58703a54f865f9979f0bf20c59cec96d2540519e74d645b698b62
-
SHA512
e035d50f4e81a5012ed1f9f49454feba586a55e448e5ba74ec030066bae10a7d43750b6561b919fb33baf710dfff4651034808fb25e9292fd912115e3e32edd8
-
SSDEEP
768:nM5H6qaGfY2SsUF2lzJQGJFARhrRGRL5GOZHMq9adEyYQUK3jSot0+FJx:nDq3Y2xVlaDRhrRGR5Lp9adiK3uKJx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2388 aaasrvs.exe 2028 aaasrvs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AaA Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aaasrvs.exe" b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AaA Services = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aaasrvs.exe" b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3724 set thread context of 3544 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 84 PID 2388 set thread context of 2028 2388 aaasrvs.exe 92 -
Program crash 2 IoCs
pid pid_target Process procid_target 3216 3724 WerFault.exe 83 2008 2388 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaasrvs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 2388 aaasrvs.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3724 wrote to memory of 3544 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 84 PID 3724 wrote to memory of 3544 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 84 PID 3724 wrote to memory of 3544 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 84 PID 3724 wrote to memory of 3544 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 84 PID 3724 wrote to memory of 3544 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 84 PID 3724 wrote to memory of 3544 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 84 PID 3724 wrote to memory of 3544 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 84 PID 3724 wrote to memory of 3544 3724 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 84 PID 3544 wrote to memory of 2388 3544 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 91 PID 3544 wrote to memory of 2388 3544 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 91 PID 3544 wrote to memory of 2388 3544 b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe 91 PID 2388 wrote to memory of 2028 2388 aaasrvs.exe 92 PID 2388 wrote to memory of 2028 2388 aaasrvs.exe 92 PID 2388 wrote to memory of 2028 2388 aaasrvs.exe 92 PID 2388 wrote to memory of 2028 2388 aaasrvs.exe 92 PID 2388 wrote to memory of 2028 2388 aaasrvs.exe 92 PID 2388 wrote to memory of 2028 2388 aaasrvs.exe 92 PID 2388 wrote to memory of 2028 2388 aaasrvs.exe 92 PID 2388 wrote to memory of 2028 2388 aaasrvs.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\b7c49c997c4f6c078602670e28021bc9_JaffaCakes118.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\aaasrvs.exe"C:\Users\Admin\AppData\Local\Temp\aaasrvs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\aaasrvs.exeC:\Users\Admin\AppData\Local\Temp\aaasrvs.exe4⤵
- Executes dropped EXE
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 4684⤵
- Program crash
PID:2008
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 4802⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3724 -ip 37241⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2388 -ip 23881⤵PID:2188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b7c49c997c4f6c078602670e28021bc9
SHA194c10e85dd81e5f21b5f58755ad91046b2409074
SHA2561e6cb8c1bfe58703a54f865f9979f0bf20c59cec96d2540519e74d645b698b62
SHA512e035d50f4e81a5012ed1f9f49454feba586a55e448e5ba74ec030066bae10a7d43750b6561b919fb33baf710dfff4651034808fb25e9292fd912115e3e32edd8