Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe
-
Size
372KB
-
MD5
be78648987cc8d8877fa28d0b436e680
-
SHA1
73f9667db9813f6ce815674cfc0538afc177eb24
-
SHA256
912c43b3def870c3b938842ac2e427bb1ba3b4739d98b9a98cec599d5b16f0f5
-
SHA512
eea1bb4a15454dda9c9e1c7633607ce6e5972855dfe8c0c978cc6c4355977c264ca9419949fbed6ff724985a4f38a0733f580dccea49380b953ca60c7020ed01
-
SSDEEP
6144:ipAM3kJo1QbtG8VQ3Rf9KDLgrtMQFD3DZSoAyA/GbEV6IPNkVwR+kyL0pPtP:gAM3ksl9RYcSQFDTZSe7Iv+J0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 532 tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DNS Manager = "C:\\Program Files (x86)\\DNS Manager\\dnsmgr.exe" be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4840 set thread context of 1852 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 91 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DNS Manager\dnsmgr.exe be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\DNS Manager\dnsmgr.exe be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe File created C:\Windows\assembly\Desktop.ini be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3168 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\FolderN\name.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 1852 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 1852 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 1852 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1852 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe Token: SeDebugPrivilege 1852 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4840 wrote to memory of 4784 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 87 PID 4840 wrote to memory of 4784 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 87 PID 4840 wrote to memory of 4784 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 87 PID 4784 wrote to memory of 3232 4784 cmd.exe 89 PID 4784 wrote to memory of 3232 4784 cmd.exe 89 PID 4784 wrote to memory of 3232 4784 cmd.exe 89 PID 4840 wrote to memory of 532 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 90 PID 4840 wrote to memory of 532 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 90 PID 4840 wrote to memory of 532 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 90 PID 4840 wrote to memory of 1852 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 91 PID 4840 wrote to memory of 1852 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 91 PID 4840 wrote to memory of 1852 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 91 PID 4840 wrote to memory of 1852 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 91 PID 4840 wrote to memory of 1852 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 91 PID 4840 wrote to memory of 1852 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 91 PID 4840 wrote to memory of 1852 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 91 PID 4840 wrote to memory of 1852 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 91 PID 4840 wrote to memory of 3004 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 92 PID 4840 wrote to memory of 3004 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 92 PID 4840 wrote to memory of 3004 4840 be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe 92 PID 3004 wrote to memory of 3168 3004 cmd.exe 94 PID 3004 wrote to memory of 3168 3004 cmd.exe 94 PID 3004 wrote to memory of 3168 3004 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f3⤵
- System Location Discovery: System Language Discovery
PID:3232
-
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\be78648987cc8d8877fa28d0b436e680_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\timeout.exetimeout /t 3003⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3168
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5be78648987cc8d8877fa28d0b436e680
SHA173f9667db9813f6ce815674cfc0538afc177eb24
SHA256912c43b3def870c3b938842ac2e427bb1ba3b4739d98b9a98cec599d5b16f0f5
SHA512eea1bb4a15454dda9c9e1c7633607ce6e5972855dfe8c0c978cc6c4355977c264ca9419949fbed6ff724985a4f38a0733f580dccea49380b953ca60c7020ed01
-
Filesize
189B
MD5dca86f6bec779bba1b58d992319e88db
SHA1844e656d3603d15ae56f36298f8031ad52935829
SHA256413b4ee68f5400fcd30ae5df957d723989b400637dbc7f5d158fa050bdc20743
SHA5124b9d532a777921543b3243020ea4b655a8b956c400b237ce714b5bd8e9a3ad7fdbcb11410e84e2e0ecc45e87dcd107385a487f5bb5b359aabd1322314ef2d24c
-
Filesize
202KB
MD5ef61ddda989f2e052586f759a252a95e
SHA1fbe444902f753c69f125cfb18a584df1aa40c97c
SHA256b40d3bf34d364853c63bb1caef39f9eb2915c41fee9aed0c6a8c1703823834a2
SHA512b5bb7a013fc574648fbc76f4f42c26080844824eb0e32a09e6cc6cfc544ad80e07807377bc1fbfa78f64bce72af363f46eaeacafe629015650112a38273a74d7