Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe
-
Size
51KB
-
MD5
bac6857b54df4633ff05e7c5fa53c23c
-
SHA1
1423af3354bdb7de5aed21dfb103d0f6eaea7f17
-
SHA256
ef486c3550929f787d66925c5cec3b1b473a22f1cd226d72b422daacc23ed5dd
-
SHA512
071857fa060310c557aee6226e93605fce3c29634b0e1fe5060f255f2bbe8543b79f6db5397ced8a6696dcfecdb8990812ee198eca062fac64505b13b1696b86
-
SSDEEP
768:DO3acfx/rebpBIplgVFlx76wZka0beN4ViHTu29FQqnezaSlBinNjWmiNAe:D2BtgglIT+a0CuiHZFfhSlBxmiNA
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 softt.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe File opened (read-only) \??\H: bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2180 set thread context of 2016 2180 softt.exe 87 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\softt.exe bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe File opened for modification C:\Windows\softt.exe bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 372 2016 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language softt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 700 bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe 700 bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe 2180 softt.exe 2180 softt.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe Token: SeBackupPrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe Token: SeRestorePrivilege 2180 softt.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 700 wrote to memory of 2180 700 bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe 85 PID 700 wrote to memory of 2180 700 bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe 85 PID 700 wrote to memory of 2180 700 bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe 85 PID 2180 wrote to memory of 2016 2180 softt.exe 87 PID 2180 wrote to memory of 2016 2180 softt.exe 87 PID 2180 wrote to memory of 2016 2180 softt.exe 87 PID 2180 wrote to memory of 2016 2180 softt.exe 87 PID 2180 wrote to memory of 2016 2180 softt.exe 87 PID 700 wrote to memory of 3352 700 bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe 89 PID 700 wrote to memory of 3352 700 bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe 89 PID 700 wrote to memory of 3352 700 bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bac6857b54df4633ff05e7c5fa53c23c_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\softt.exeC:\Windows\softt.exe softt2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 124⤵
- Program crash
PID:372
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~SiGou.bat2⤵
- System Location Discovery: System Language Discovery
PID:3352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2016 -ip 20161⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240B
MD52b3c783993b6dde591574fac49555f41
SHA1211223e2802b0a925f69d9421826d3f4af09631d
SHA2563f5f3071a69c415276e0d6626d3195a3f91adfd1a3243c73c00e4579e3702aae
SHA51274c3dd87bff630793135f393d303aa24608232d6d8351e484e1f9ef89bf29cac8b2d2a49f136115100e287f87e502a0879d2cfe03a30c2faf38b1b7abfa960b0
-
Filesize
51KB
MD5bac6857b54df4633ff05e7c5fa53c23c
SHA11423af3354bdb7de5aed21dfb103d0f6eaea7f17
SHA256ef486c3550929f787d66925c5cec3b1b473a22f1cd226d72b422daacc23ed5dd
SHA512071857fa060310c557aee6226e93605fce3c29634b0e1fe5060f255f2bbe8543b79f6db5397ced8a6696dcfecdb8990812ee198eca062fac64505b13b1696b86