Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 13:43
Static task
static1
Behavioral task
behavioral1
Sample
c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe
-
Size
70KB
-
MD5
c0de2132b437d1228bac06968d15273d
-
SHA1
58617e907a56d5c7709927348e10ef87821835d7
-
SHA256
84a7b5bc0070b8b192a84e948fc76991032ab6df5abc355203ead6021b996fa3
-
SHA512
d24bdefd098c5af8199ccef80663be170d09b6608762064bb9c8497422ca376b1aaee6f595d9d596f1fb25cb63e19ee5bc28d66c226f60fb5befdce7e138dd16
-
SSDEEP
1536:AVy3jzVFTTGGBzq4wcm5NTRtLtNDWvFVx19y03cU3q65T8T2RHD7vea2:hfvGn4wlTRdDWJ1Pw65ZfvF2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2656 helperpnew.exe -
Executes dropped EXE 3 IoCs
pid Process 2656 helperpnew.exe 3980 pnew.exe 3888 helperpnew.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pgrnew = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe" c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pgrnew = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe" c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\pgrnew = "C:\\Windows\\SysWOW64\\pnew.exe" pnew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pgrnew = "C:\\Windows\\SysWOW64\\pnew.exe" pnew.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\helperpnew.exe c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe File created C:\Windows\SysWOW64\helperpnew.exe c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe File created C:\Windows\SysWOW64\pnew.exe helperpnew.exe File opened for modification C:\Windows\SysWOW64\pnew.exe helperpnew.exe File opened for modification C:\Windows\SysWOW64\helperpnew.exe pnew.exe File opened for modification C:\Windows\SysWOW64\pnew.exe helperpnew.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language helperpnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnew.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1404 wrote to memory of 2656 1404 c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe 84 PID 1404 wrote to memory of 2656 1404 c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe 84 PID 1404 wrote to memory of 2656 1404 c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe 84 PID 2656 wrote to memory of 3980 2656 helperpnew.exe 95 PID 2656 wrote to memory of 3980 2656 helperpnew.exe 95 PID 2656 wrote to memory of 3980 2656 helperpnew.exe 95 PID 3980 wrote to memory of 3888 3980 pnew.exe 96 PID 3980 wrote to memory of 3888 3980 pnew.exe 96 PID 3980 wrote to memory of 3888 3980 pnew.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\helperpnew.exeC:\Users\Admin\AppData\Local\Temp\c0de2132b437d1228bac06968d15273d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\pnew.exeC:\Windows\system32\pnew.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\helperpnew.exeC:\Windows\SysWOW64\pnew.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5aaada8f721ddfe814b3869d3e2100d66
SHA1e5b64e46009e30e5749060162da9fe9dc8bb7640
SHA2568d97eb9865ec643830fca863257b396e5a62253b696fb0680499cdb24d2c80e7
SHA512fe47831739407e01a1e8a406b5b6598dfc32bbd32635088ad5be003ba08136c7631ff9372c2916c5d664e52c65dab1f7b65c17bc29363f5f0f0aabce35c1a58d
-
Filesize
70KB
MD5c0de2132b437d1228bac06968d15273d
SHA158617e907a56d5c7709927348e10ef87821835d7
SHA25684a7b5bc0070b8b192a84e948fc76991032ab6df5abc355203ead6021b996fa3
SHA512d24bdefd098c5af8199ccef80663be170d09b6608762064bb9c8497422ca376b1aaee6f595d9d596f1fb25cb63e19ee5bc28d66c226f60fb5befdce7e138dd16