Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe
-
Size
37KB
-
MD5
b9feb16b174259bbdc3be7dabf880df1
-
SHA1
c7f89c2b82eb856487c8b5e01a8a17bd86038f9f
-
SHA256
93415a654d7490707f270c3f0ecc4574b7d29d4c54e57ae2b9046db205c6ea1e
-
SHA512
927e4424b7a6a99756bccd5386d7f04c9ea0b12b6034a18b29653f104a20c5b535851abd02c6316bd6439139287fe904e002dc16b87d3590715d3f5da704234f
-
SSDEEP
768:fBe63Mih/hgq+EcYmroNDFIqaQYgxqsKqWG+/VDg:xMCcUmrQnR3hYV
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5056 SiZhu.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SiZhu.exe SiZhu.exe File opened for modification C:\Windows\SysWOW64\SiZhu.exe b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe File created C:\Windows\SysWOW64\SiZhu.exe b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SiZhu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe Token: SeDebugPrivilege 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3508 wrote to memory of 5056 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 97 PID 3508 wrote to memory of 5056 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 97 PID 3508 wrote to memory of 5056 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 97 PID 5056 wrote to memory of 2568 5056 SiZhu.exe 98 PID 5056 wrote to memory of 2568 5056 SiZhu.exe 98 PID 5056 wrote to memory of 2568 5056 SiZhu.exe 98 PID 3508 wrote to memory of 4324 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 99 PID 3508 wrote to memory of 4324 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 99 PID 3508 wrote to memory of 4324 3508 b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9feb16b174259bbdc3be7dabf880df1_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\SiZhu.exeC:\Windows\system32\SiZhu.exe SiZhu2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat3⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat2⤵
- System Location Discovery: System Language Discovery
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4464,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4028 /prefetch:81⤵PID:728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130B
MD505f52e759c787bfbf843ba36ccf734a2
SHA12d81a279dd24a320a62d184fec747ca5f70570ee
SHA2564c9b671f2169b55c0265974d2d618e9e03060a0664da88c05ea580be9eb2a7a9
SHA512efcbce3fbcb8a0e22d4b41bfcf7afe73e5dd1bf4ceded4892fdd060e993dcf7c3930c989b6eb4fe1b690ced1f70a0e9ef75dfe6b5e2a61f9be14ef9169c6d172
-
Filesize
240B
MD507e6e4196eec61a346c0a68ec071c84f
SHA1f7b0b5adf5a5b68062bfb2f4d09a7424773820bc
SHA256ae90c14928316e54aad4c9b8d59c059a0eb0130a38f3a821e2fa3f49d7b078e7
SHA512035666af93f6dbdf35129433ea70bc637b7c700beb0ff48bd37d042be8d695a5ba7bc0a41858254e18990cddc87a544a2fc1f2464f538cffc6c0046f1506bffd
-
Filesize
37KB
MD5b9feb16b174259bbdc3be7dabf880df1
SHA1c7f89c2b82eb856487c8b5e01a8a17bd86038f9f
SHA25693415a654d7490707f270c3f0ecc4574b7d29d4c54e57ae2b9046db205c6ea1e
SHA512927e4424b7a6a99756bccd5386d7f04c9ea0b12b6034a18b29653f104a20c5b535851abd02c6316bd6439139287fe904e002dc16b87d3590715d3f5da704234f