Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 19:41
Static task
static1
Behavioral task
behavioral1
Sample
c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe
-
Size
153KB
-
MD5
c7863ca4746b2fae4495bfa6f3162077
-
SHA1
1c81b9679f8c1cf5999e7a94aedd47bf1cb2b3b0
-
SHA256
95bf44ad7c1e827f859b2e69838fd936e703546f2b54f60c8acbb1516d93ec1d
-
SHA512
f4c31c5e01daee0ff6de447949bac02da7809d2779b31d69f11ffa6d87c017a915a6dd878d8921a7cf20afd7d9863323451b9f9212140bfb90c5bfbd44019eef
-
SSDEEP
3072:s94QzUtkEThySk9oOpz+8GHxmFLtcTjc0MiY1p:s94/h1u2UEjBFY1p
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1692 Exporer32.exe 2556 R00nH4x0l2.exe -
resource yara_rule behavioral2/files/0x0007000000023456-16.dat upx behavioral2/memory/1692-22-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/1692-39-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/2556-40-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Load = "C:\\Windows\\system32\\R00nH4x0l2.exe" Exporer32.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\R00nH4x0l2.exe R00nH4x0l2.exe File opened for modification C:\Windows\SysWOW64\Y_MELT.txt R00nH4x0l2.exe File opened for modification C:\Windows\SysWOW64\R00nH4x0l2.exe Exporer32.exe File opened for modification C:\Windows\SysWOW64\Y_MELT.txt Exporer32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\PCGWIN32.LI4 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exporer32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language R00nH4x0l2.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{E844B0BE-681C4B67-0B649277-F0E02467}\ = 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 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{D50DBC70-EDF2330C-38FF8F7C} c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\{D50DBC70-EDF2330C-38FF8F7C}\ = "24361303" c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{E844B0BE-681C4B67-0B649277-F0E02467}\ = 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 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\{E844B0BE-681C4B67-0B649277-F0E02467} c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\{E844B0BE-681C4B67-0B649277-F0E02467}\ = 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 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4476 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe 1692 Exporer32.exe 2556 R00nH4x0l2.exe 2556 R00nH4x0l2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4476 wrote to memory of 1692 4476 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe 87 PID 4476 wrote to memory of 1692 4476 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe 87 PID 4476 wrote to memory of 1692 4476 c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe 87 PID 1692 wrote to memory of 2556 1692 Exporer32.exe 88 PID 1692 wrote to memory of 2556 1692 Exporer32.exe 88 PID 1692 wrote to memory of 2556 1692 Exporer32.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7863ca4746b2fae4495bfa6f3162077_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"C:\Users\Admin\AppData\Local\Temp\Exporer32.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\R00nH4x0l2.exeC:\Windows\system32\R00nH4x0l2.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5b2abb644b7e841417e95edee2d4e8614
SHA131f3ad9493a6061fff6da386650b29f14e2d871d
SHA256adac5b908bf637dc6f1b1e8619b293038b9605a78c8f9965d1ad3b3b5b9ed4c6
SHA51261acb27e263d1ade0d59f3f2ba9fd8d950164b2fcb1b638f6aca5d3df8b1850b56d187f3bf61226cf0008a7d81815bf7b67f99fce2e440a802cb3e5efd6a31cb
-
Filesize
47B
MD56edff0bbb52d90af63df7ef2599df1bd
SHA169af0ad4ec7130e8a5a3d55f080ae0656526cf7b
SHA256392294511359b0098fdd4a0796a4260e13c6e923fe9017e226aab3ecc2e3898b
SHA512ac48f4da4558d721f0cda431cb1b017db3dfb4a131ef0c723fc316145f0e1474f84a0cb898416d172bc22c700d54312268d1ba9376188d059420b70057e1cf6a