Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe
-
Size
218KB
-
MD5
c8d439a18c7f9b7012c905ee33c73d27
-
SHA1
cc9854482b3fd438ead81386db265b22bec849bc
-
SHA256
497672dab60854b17467d7e01d86e5c700107b806ce6f184abf0425770d12710
-
SHA512
c2dc99c5ada3ad7d72da5682fa7d85c638f3e58739cdc82ca2ea2841434a8fc738b383024e256b2332db3d3fd83e196456e81fb0fcfa1c8d599f7798da71ea02
-
SSDEEP
6144:ZJUvv6VR/NVTId+emMj91W2cu2MIv6VR/i:ZJEW/Dhebx1B2MIW/i
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe -
Executes dropped EXE 11 IoCs
pid Process 2756 msnplus.exe 3416 windows.exe 2300 windows.exe 4584 windows.exe 3832 windows.exe 2688 windows.exe 1476 windows.exe 4068 windows.exe 3784 windows.exe 3836 windows.exe 3104 windows.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft System = "C:\\WINDOWS\\System32\\regedit.exe" msnplus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Startup = "C:\\WINDOWS\\System32\\msnplus.exe" msnplus.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created \??\c:\windows\SysWOW64\msnplus.exe c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created \??\c:\windows\SysWOW64\windows.exe c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnplus.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key msnplus.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" msnplus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key windows.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2756 msnplus.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2756 2368 c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe 84 PID 2368 wrote to memory of 2756 2368 c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe 84 PID 2368 wrote to memory of 2756 2368 c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe 84 PID 2368 wrote to memory of 3416 2368 c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe 85 PID 2368 wrote to memory of 3416 2368 c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe 85 PID 2368 wrote to memory of 3416 2368 c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe 85 PID 3416 wrote to memory of 2300 3416 windows.exe 97 PID 3416 wrote to memory of 2300 3416 windows.exe 97 PID 3416 wrote to memory of 2300 3416 windows.exe 97 PID 2300 wrote to memory of 4584 2300 windows.exe 99 PID 2300 wrote to memory of 4584 2300 windows.exe 99 PID 2300 wrote to memory of 4584 2300 windows.exe 99 PID 4584 wrote to memory of 3832 4584 windows.exe 104 PID 4584 wrote to memory of 3832 4584 windows.exe 104 PID 4584 wrote to memory of 3832 4584 windows.exe 104 PID 3832 wrote to memory of 2688 3832 windows.exe 105 PID 3832 wrote to memory of 2688 3832 windows.exe 105 PID 3832 wrote to memory of 2688 3832 windows.exe 105 PID 2688 wrote to memory of 1476 2688 windows.exe 110 PID 2688 wrote to memory of 1476 2688 windows.exe 110 PID 2688 wrote to memory of 1476 2688 windows.exe 110 PID 1476 wrote to memory of 4068 1476 windows.exe 112 PID 1476 wrote to memory of 4068 1476 windows.exe 112 PID 1476 wrote to memory of 4068 1476 windows.exe 112 PID 4068 wrote to memory of 3784 4068 windows.exe 113 PID 4068 wrote to memory of 3784 4068 windows.exe 113 PID 4068 wrote to memory of 3784 4068 windows.exe 113 PID 3784 wrote to memory of 3836 3784 windows.exe 114 PID 3784 wrote to memory of 3836 3784 windows.exe 114 PID 3784 wrote to memory of 3836 3784 windows.exe 114 PID 3836 wrote to memory of 3104 3836 windows.exe 115 PID 3836 wrote to memory of 3104 3836 windows.exe 115 PID 3836 wrote to memory of 3104 3836 windows.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c8d439a18c7f9b7012c905ee33c73d27_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\msnplus.exe"C:\Windows\System32\msnplus.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\System32\windows.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\windows.exeC:\Windows\system32\windows.exe 1156 "C:\Windows\SysWOW64\windows.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\windows.exeC:\Windows\system32\windows.exe 1116 "C:\Windows\SysWOW64\windows.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\windows.exeC:\Windows\system32\windows.exe 1128 "C:\Windows\SysWOW64\windows.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\windows.exeC:\Windows\system32\windows.exe 1136 "C:\Windows\SysWOW64\windows.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\windows.exeC:\Windows\system32\windows.exe 1132 "C:\Windows\SysWOW64\windows.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\windows.exeC:\Windows\system32\windows.exe 1140 "C:\Windows\SysWOW64\windows.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\windows.exeC:\Windows\system32\windows.exe 1144 "C:\Windows\SysWOW64\windows.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\windows.exeC:\Windows\system32\windows.exe 1148 "C:\Windows\SysWOW64\windows.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\windows.exeC:\Windows\system32\windows.exe 1152 "C:\Windows\SysWOW64\windows.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3104
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5a73ade8c4edbfc99215a4f57e720a589
SHA1022c99663f6801a6b126301f87f2b75d6f8f94d5
SHA25614f84a9163c8495bae331ae39d2e0c09ea264b3208d7541d9e280b89237a343d
SHA51294178db609a39929f5e8888669e0dc74b66b6f6c7d3bf947fe3e66562c463b490ac74b5859719b138a6ad588b0381ae30389d80d8de55d99262ec610daac34ae
-
Filesize
151KB
MD5dc5d5cb528a44120a30c5bce90ba1f9e
SHA153dd156cab192488e40af613aa449004e2f89162
SHA256b76e32478a2d82e778ba104344638a44f5fc447511bced91123de1e4b297644f
SHA51214db907815fe02ff01c0665b280eff9e3312b2051fd7a220e29c01f5190ea1eac285f4687c3c7437e02800e17b684b324e4559ed4be3fbdd109bc19cf98043aa