Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe
-
Size
72KB
-
MD5
c779357359a149be50dcbe50ba0b0aee
-
SHA1
4c2513eaf357236bb6002b4b309e46d45cb2bca1
-
SHA256
a89b1753375b1e05278bc263586f458431ba3bb699ce72300a553c59d835e85e
-
SHA512
d58112b6c536c144cf528e7806b902f0b33561a6092f3d15f02c7c21f4c4f8ac77bd651c54c7f653397c7c85265cb55298c455e77b089436d9663869328172e5
-
SSDEEP
768:R1IDznkNTPVLzuKGanJB8CGQyk0VJf45WM1h6AIM7e4VPTIjj4Vt0qK4ko:X4jUPRSranJBQ/zVZ45z/Tew/VtKo
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 2308 svchost.exe 4444 svchosts.exe 3960 svchostc.exe -
Loads dropped DLL 1 IoCs
pid Process 2308 svchost.exe -
resource yara_rule behavioral2/files/0x000700000002350f-11.dat upx behavioral2/memory/4444-12-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/3960-15-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral2/files/0x0007000000023510-14.dat upx behavioral2/memory/4444-29-0x0000000000400000-0x0000000000411000-memory.dmp upx behavioral2/memory/3960-31-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Online Service = "C:\\Windows\\svchost.exe" c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchosts.exe c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe File created C:\Windows\SysWOW64\svchostc.exe c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\svchost.exe c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe File created C:\Windows\msin32.dll c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe File opened for modification C:\Windows\sysini.ini c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe File opened for modification C:\Windows\sysini.ini svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostc.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://tits.hardcore4ever.net/" svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2700 c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe 2700 c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe 2308 svchost.exe 2308 svchost.exe 2308 svchost.exe 2308 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2308 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2308 2700 c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe 84 PID 2700 wrote to memory of 2308 2700 c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe 84 PID 2700 wrote to memory of 2308 2700 c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe 84 PID 2308 wrote to memory of 4444 2308 svchost.exe 85 PID 2308 wrote to memory of 4444 2308 svchost.exe 85 PID 2308 wrote to memory of 4444 2308 svchost.exe 85 PID 2308 wrote to memory of 3960 2308 svchost.exe 86 PID 2308 wrote to memory of 3960 2308 svchost.exe 86 PID 2308 wrote to memory of 3960 2308 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c779357359a149be50dcbe50ba0b0aee_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\svchosts.exesvchosts.exe -p20083⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4444
-
-
C:\Windows\SysWOW64\svchostc.exesvchostc.exe -p20103⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5b74c5ca856c19bcbe7de6399d7752e8f
SHA14849b055528c955808c1a7e1a34d742d294d9a87
SHA256aba46e456aed21aeb55231090a16953b73547bb4f6480e49893c8eb5f03303df
SHA5126de484d15d092191cd6a0152c00425406a43d2ba8dcc51d1a8f8077adf4c287402f918a0d2831a0789c298904df40c044456c842ac77c9239638a71ee4da649d
-
Filesize
17KB
MD5af408edfc5c6a656f93727912b9023df
SHA1321e1e7838f8f39a2c6bf63c9f72586048228796
SHA256215fab38da71c674f1734ee2fbe74117b996bb3faf44dc7dd27a636532737be1
SHA512e732234631bad6d71509311203e64205702c981d0477bba26275b411afe52603cbd0631768a95199ed2ae415e2ae17e62c21c8886fbae995974a6cc4ec7f8b18
-
Filesize
3KB
MD5110efc35e9ed33d47874d6fb8191fd62
SHA16cccd8fa729db07e7c26f2ab5f2d63ac4b92c726
SHA256d642e5fe3852516af1427941c6cb13116b051f3be4e484b8701090930242b570
SHA5120db71ced67905c5c0ff62c56343c7ac5c1c6b4e0729cdbf549149045b143bcc2b6534a25cb2486522366ff6d717cdc259bf875d37059c91cd093da26d9619453
-
Filesize
30KB
MD5acdc7411a4fc7634ad609c15827594fe
SHA1a08137f6fac421d588e6ac1aeff9767885826f7b
SHA256a4ff41ca16476c61ebf6d6ca7c1b6a552a2deb10af5b69033f7dd7e597d5d187
SHA5125c35349b6aee9d830fd3d7727c8de9f7954fb594ef632c5232a1de80cf7418865538f1bf9a022635d310a5d32b3eec8d6c7bfc112f1f1339a1eb1fb8567fcbc0
-
Filesize
42B
MD501f5641239c88d486028c4fecab2169d
SHA198b737ba0e731c1bc804900d34598e0a00b9faaa
SHA25695edd82a58e7338cbfc267f71614f48ef7a2434f5f635e8d622f5de1a5a0f6f3
SHA5127fe732228ae1dfdfc2eca0febd2bf389606f078449a872fde97996befe628216f13bcbc673592fd185360485894ed5befb9bcf8d278eb1fe399367d0e5d480b2