Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe
-
Size
5.4MB
-
MD5
c08c4e432b1e91dd7d2eabd375d52249
-
SHA1
8b3590da0ec16f4c21de4e36c847ade1aa9461f3
-
SHA256
1969f0a523637fbeba837e4c831172815325f7eb1b7998b4bc20a63ce625166d
-
SHA512
b3eab01de414ce3e522f4bc255cf7b29aa1a992353fbae97c331419c4968d0b1fe414d9b4fecf482d91c687cdcb99ad63bb086b0770f3b5e69aedbc82e638da9
-
SSDEEP
24576:LXkpCNzgduJNQmn2ugeZAQbFT4B96NlpRruKc4wqXjFM5Uc1p8k2:LXJqcQRUAQkmuzjTI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4252 netview.exe 3280 360Safe.exe -
Loads dropped DLL 1 IoCs
pid Process 4252 netview.exe -
resource yara_rule behavioral2/files/0x00070000000234b3-6.dat upx behavioral2/memory/4252-8-0x0000000010000000-0x000000001000A000-memory.dmp upx behavioral2/files/0x00090000000234ab-10.dat upx behavioral2/memory/3280-12-0x0000000000400000-0x000000000055E400-memory.dmp upx behavioral2/memory/4252-14-0x0000000010000000-0x000000001000A000-memory.dmp upx behavioral2/memory/3280-15-0x0000000000400000-0x000000000055E400-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShellRun = "C:\\Users\\Admin\\Documents\\netview.exe" netview.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3488 4252 WerFault.exe 85 1864 4252 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netview.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 360Safe.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4252 netview.exe 4252 netview.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4252 netview.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2448 c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe 2448 c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2448 wrote to memory of 4252 2448 c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe 85 PID 2448 wrote to memory of 4252 2448 c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe 85 PID 2448 wrote to memory of 4252 2448 c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe 85 PID 4252 wrote to memory of 3280 4252 netview.exe 88 PID 4252 wrote to memory of 3280 4252 netview.exe 88 PID 4252 wrote to memory of 3280 4252 netview.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c08c4e432b1e91dd7d2eabd375d52249_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\Documents\netview.exeC:\Users\Admin\Documents\\netview.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\Documents\360Safe.exeC:\Users\Admin\Documents\360Safe.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 9123⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 9603⤵
- Program crash
PID:1864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4252 -ip 42521⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4252 -ip 42521⤵PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD54d02e7c44a780042444eb61e2b4ebd17
SHA13bcdac35f082f1f37a78db85a73c4b51fc7ae450
SHA256c9f9483bc864e318767c932393dd7bc42c342d3c76694bd0424f6ff7f0e2904f
SHA5120a0bec282654d30a5742d60f2de823a1109163cb90ba8c9cf36b7c60bfdea6a0a6d4668372ed7e7e07d8731ae10c32c20d53dc3a81c8101b7a300cdcf9d51dd3
-
Filesize
4.8MB
MD5e3ce6845d6b42f44e0e0d11853deb67e
SHA17d500b8086ba6acef116d079be28c7dc41551628
SHA256302f6a2917be8582898b8644e86315cb8e97211b846e589bfa00f3ac11e182dc
SHA51286cb01c74181f3a37d9231031dda7ed0a7701b43a11e0e107b7aecafe2e1fee26655de089af9b8b554ff82a812063cc94ebd32acb3b1a1fa894c2041d01e0369
-
Filesize
361KB
MD5a248923e41c06a8bc4d3fc8ab27fcead
SHA17a5727b89a9b1444a3bf66c73a0b97a583c406c1
SHA2567734a1e3f680fd284a006a3c6a5c265cbef0e6cb066f266e10486a280428555d
SHA5121106d241bd1d0aac9a4731e4cd76fe83b97300d4d7463b314985f187a1a8435e9cf1e0d426cabfa2c2f6e69ee48c8e3a2238242fcccb43ac322cadb06d61234b