Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe
-
Size
48KB
-
MD5
c27f3a3f6e135549b020de978f188f02
-
SHA1
31002066eae41d82a373404330be139db20f449d
-
SHA256
9be2b6d41b0cda5a9421db13232b83d7480471751c6be6907937f529d027935e
-
SHA512
bdd2e5d76edf6da5265f28bc8dc6d4299271898ff5c413f828ffaac3c90886be7ef2f9b6d93d22b6733194d254ea8bcb3b5bc6b7013ceb8e3466fa4812cfd631
-
SSDEEP
192:GrN1miRx8TeAOU190BBkxCQOXW8Vn3NLg5qPCVu1miRx8:wUTRyBbQiVnShVWU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,New Folder.exe" c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\New Folder = "New Folder.exe" c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\New Folder.exe c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\New Folder.exe c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3024 c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c27f3a3f6e135549b020de978f188f02_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5c27f3a3f6e135549b020de978f188f02
SHA131002066eae41d82a373404330be139db20f449d
SHA2569be2b6d41b0cda5a9421db13232b83d7480471751c6be6907937f529d027935e
SHA512bdd2e5d76edf6da5265f28bc8dc6d4299271898ff5c413f828ffaac3c90886be7ef2f9b6d93d22b6733194d254ea8bcb3b5bc6b7013ceb8e3466fa4812cfd631
-
Filesize
36B
MD598e025b06e26eaab741fe250f32db780
SHA151cee3c0ed28bd6a5fc8c598be8c7f2a967b9aaa
SHA256ee5b7bc4e694b7530d1d96a0fe4d7018837ae0e40463f781f75291d62a78d76a
SHA512a235ab84957768b9e57752b68b3a13f0e0f9935aa27cfc97ed9ade0e606a518829036a83f92fd5b51c71dc0a98a38b3ce782312fef45fa19127639b1b61dc606