Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
bd79defe4e98b1daa53e815456b0fcfb
-
SHA1
b90fc77d5d171181487f7ea8a0aa88d0a0702d92
-
SHA256
ac8f52671bfb89fe4eaddeb7dffb471205d4dfc88ee3b64efb349027959382e7
-
SHA512
854161c715633ad6b37f2e20673dc8695fc671fba4348a62c11b38ecf5fe7207876ea1430fc6d9722fd6125321c8efd02b5ecd5d06d7da93a046f199bc955ab2
-
SSDEEP
1536:rWW9hZZ+PVGdm9Rb7HDlcDw/sH3lVQ3poAr/kNkFlZBFTcJa:rLpYN4m9LcDw+qqAr/kNAluJa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1896 Explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 1896 Explorer.exe 3080 explorer.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Dtjqmk Doskkpav\Explorer.exe bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Dtjqmk Doskkpav\Explorer.exe bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Ekdndbtkyo\11306 Explorer.exe File opened for modification C:\Program Files (x86)\Ekdndbtkyo\17620 Explorer.exe File opened for modification C:\Program Files (x86)\Ekdndbtkyo\Path.rcd bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings Explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe 1896 Explorer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2828 wrote to memory of 1896 2828 bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe 84 PID 2828 wrote to memory of 1896 2828 bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe 84 PID 2828 wrote to memory of 1896 2828 bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe 84 PID 1896 wrote to memory of 3080 1896 Explorer.exe 85 PID 1896 wrote to memory of 3080 1896 Explorer.exe 85 PID 1896 wrote to memory of 3080 1896 Explorer.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Dtjqmk Doskkpav\Explorer.exe.2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Dtjqmk Doskkpav\explorer.exeexplorer.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3080
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD52a55264ecc85db36ddf7acbdbbbdbcbe
SHA1e2b901fc9c2c29a0de411432ed7603e8eeaf240b
SHA256f109f7905c7aa0a1c8e201f5e345eb592f663bd753fba7b90930eabd984be8f5
SHA512214d026912a396d1fbf25dc11dabb7da96071cac9f78a0e353349c1dec952ac5cb231bd246c6aff2852752f0164b547783986a0ae7f79c336330c6ec9b7072fd
-
Filesize
10KB
MD569c97278ab9e590932fef729f038b151
SHA1076048304500a16cc37dbd8e3d4c42fbc3364ba3
SHA25689287807eae136d2f00851331e45598287993adfccff325e9251f7107fb93ac6
SHA5128d822d479fa2dff6f77153f3d4ae0efd65e44c0ef768b074d49549e685adcae8ca75c58dab5d4b45558fa65f9a21cd302b73fba12cc7ee5c1db1f71a382c7906
-
Filesize
260B
MD51e2b8dbe12dd2ffa8619fe195a8fb629
SHA1ee44098ec9203129381876786355d6436b54a2d7
SHA256edd0202904aa592425636fe529a845edc43bdbc7e7e374952164a69d0416e3f6
SHA512ff7cb4b44941a993c1684448ff08c1bd118cbda09ce67cae9a5d4a1d92221a8382c56dba94f1070856242de33fb1edb531933c11ac7dbbe33e207d770c58107a