Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 02:13
Static task
static1
Behavioral task
behavioral1
Sample
b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe
-
Size
64KB
-
MD5
b9f73cd1ea5fd1d485c7e3a3d0873c08
-
SHA1
83f67cd5bd33dadf12bb4dfc3c9afc21d925cc9a
-
SHA256
c7c077976ad3339b98e9346c33232e64135b9a6a36c7f084c781977b8569bf49
-
SHA512
bec6ed0b82b403148c8b11da476ea44a7594c8c31ea35a91e75b8d31f5333a49a60ccb4526d26fe3cadc85ec89e55e150ee92953a8f6da5f764f695b1ec5c1de
-
SSDEEP
1536:uzoTLHgIIvy4pXBCwl6K1YiC0OfBPy4BFNV4LM:XTLHVlQXBxhWly0F0LM
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 316 svcchosst.exe 3648 svcchosst.exe 4552 svcchosst.exe 4396 svcchosst.exe 2512 svcchosst.exe 440 svcchosst.exe 4008 svcchosst.exe 3388 svcchosst.exe 4852 svcchosst.exe 640 svcchosst.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File created C:\Windows\SysWOW64\svcchosst.exe b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe File created C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe File opened for modification C:\Windows\SysWOW64\svcchosst.exe svcchosst.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcchosst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcchosst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcchosst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcchosst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcchosst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcchosst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcchosst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcchosst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcchosst.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4776 wrote to memory of 316 4776 b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe 87 PID 4776 wrote to memory of 316 4776 b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe 87 PID 4776 wrote to memory of 316 4776 b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe 87 PID 316 wrote to memory of 3648 316 svcchosst.exe 98 PID 316 wrote to memory of 3648 316 svcchosst.exe 98 PID 316 wrote to memory of 3648 316 svcchosst.exe 98 PID 3648 wrote to memory of 4552 3648 svcchosst.exe 100 PID 3648 wrote to memory of 4552 3648 svcchosst.exe 100 PID 3648 wrote to memory of 4552 3648 svcchosst.exe 100 PID 4552 wrote to memory of 4396 4552 svcchosst.exe 103 PID 4552 wrote to memory of 4396 4552 svcchosst.exe 103 PID 4552 wrote to memory of 4396 4552 svcchosst.exe 103 PID 4396 wrote to memory of 2512 4396 svcchosst.exe 104 PID 4396 wrote to memory of 2512 4396 svcchosst.exe 104 PID 4396 wrote to memory of 2512 4396 svcchosst.exe 104 PID 2512 wrote to memory of 440 2512 svcchosst.exe 106 PID 2512 wrote to memory of 440 2512 svcchosst.exe 106 PID 2512 wrote to memory of 440 2512 svcchosst.exe 106 PID 440 wrote to memory of 4008 440 svcchosst.exe 107 PID 440 wrote to memory of 4008 440 svcchosst.exe 107 PID 440 wrote to memory of 4008 440 svcchosst.exe 107 PID 4008 wrote to memory of 3388 4008 svcchosst.exe 116 PID 4008 wrote to memory of 3388 4008 svcchosst.exe 116 PID 4008 wrote to memory of 3388 4008 svcchosst.exe 116 PID 3388 wrote to memory of 4852 3388 svcchosst.exe 117 PID 3388 wrote to memory of 4852 3388 svcchosst.exe 117 PID 3388 wrote to memory of 4852 3388 svcchosst.exe 117 PID 4852 wrote to memory of 640 4852 svcchosst.exe 121 PID 4852 wrote to memory of 640 4852 svcchosst.exe 121 PID 4852 wrote to memory of 640 4852 svcchosst.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1164 "C:\Users\Admin\AppData\Local\Temp\b9f73cd1ea5fd1d485c7e3a3d0873c08_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1116 "C:\Windows\SysWOW64\svcchosst.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1092 "C:\Windows\SysWOW64\svcchosst.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1096 "C:\Windows\SysWOW64\svcchosst.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1108 "C:\Windows\SysWOW64\svcchosst.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1100 "C:\Windows\SysWOW64\svcchosst.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1084 "C:\Windows\SysWOW64\svcchosst.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1104 "C:\Windows\SysWOW64\svcchosst.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1120 "C:\Windows\SysWOW64\svcchosst.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\svcchosst.exeC:\Windows\system32\svcchosst.exe 1088 "C:\Windows\SysWOW64\svcchosst.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:640
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b9f73cd1ea5fd1d485c7e3a3d0873c08
SHA183f67cd5bd33dadf12bb4dfc3c9afc21d925cc9a
SHA256c7c077976ad3339b98e9346c33232e64135b9a6a36c7f084c781977b8569bf49
SHA512bec6ed0b82b403148c8b11da476ea44a7594c8c31ea35a91e75b8d31f5333a49a60ccb4526d26fe3cadc85ec89e55e150ee92953a8f6da5f764f695b1ec5c1de