Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe
-
Size
214KB
-
MD5
bfdd3ce3c65defe2f1e56f754ed14580
-
SHA1
7beebdf4b398948ffcc792ff7d7da6ce90c0b438
-
SHA256
779b572e0fbed135dd5c745bb28eb5289313bc1741b9e880ccbcbf06f07e32ba
-
SHA512
4bee790cee7bdc134ae859a62ab63de6067e1f2d96388400f4069ce834e5bb4132c4a9ad69ec924af137a73378e978170627ec8377ea55f4d9b034534e2e61b3
-
SSDEEP
3072:PWf6XsOYCyIVt4dkDmL25pm+E84dfl8GoaxdBNiQhxf4pwlaqUtZEma+h8ybAh:PWC8O9F4dn25bElfl88XP4qvh+h8yQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2068 services.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\services.exe bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe File created C:\Windows\services.exe bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe File opened for modification C:\Windows\services.exe services.exe File created C:\Windows\winservices.dll services.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\.Default\Software\Microsoft\Windows\CurrentVersion\Internet Settings services.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodial = 00000000 services.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodisconnect = 00000000 services.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2068 2804 bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe 86 PID 2804 wrote to memory of 2068 2804 bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe 86 PID 2804 wrote to memory of 2068 2804 bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe 86 PID 2804 wrote to memory of 1328 2804 bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe 87 PID 2804 wrote to memory of 1328 2804 bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe 87 PID 2804 wrote to memory of 1328 2804 bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfdd3ce3c65defe2f1e56f754ed14580_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a$$.bat2⤵
- System Location Discovery: System Language Discovery
PID:1328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5359f8012e908a57f9780ed1cb8664e7e
SHA1b933cdba99a4c684dfca1f7c0711acd6a94b7f89
SHA256248b06abd0c33443e56a99aa2119d431a78aba45b15381bd8b7ba2d9d738addd
SHA51201684e0d11863f766f7e9eb598def3323ae159b7436534eb811a513d8bc2128e324522fde4e318b575d65e3d8317d53460d00fb597efbf0bb348b4ed8d18eda7
-
Filesize
214KB
MD5bfdd3ce3c65defe2f1e56f754ed14580
SHA17beebdf4b398948ffcc792ff7d7da6ce90c0b438
SHA256779b572e0fbed135dd5c745bb28eb5289313bc1741b9e880ccbcbf06f07e32ba
SHA5124bee790cee7bdc134ae859a62ab63de6067e1f2d96388400f4069ce834e5bb4132c4a9ad69ec924af137a73378e978170627ec8377ea55f4d9b034534e2e61b3
-
Filesize
1KB
MD5242de69aabc179ce99370160399e32c6
SHA1cdce6a48eb8224400149759572f9a72c6aaf50a0
SHA2562b34f3ffda6e601b9fad818596f83e4012799a595edbbe7e772f2e0dc0c7cb72
SHA512bc87a371f7cfca955fb26b92c1656e795bb3f795fb372c4d70c200624b7c38f695d5ac626140cd88d3893b14fad228008b1f80a37adbd2df15d0ce482bebce38