Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118
-
Size
360KB
-
Sample
240831-25s5es1blm
-
MD5
cdc6b8390037fea52d1d56c41d1f088c
-
SHA1
cf0aa31b75f4f174ad07455555a46d12df369b1a
-
SHA256
b68c8708e5cef34726f5114207ae90eb09176d723050725a2541834342b90742
-
SHA512
a53b4c80c1a164930ef9fe075e10944a0f89d109092fe6e5d434587d7e1bd88f954122082ee833b8b4b668796dc23afe3a4e0597c5ec5e071197805ecf21fdce
-
SSDEEP
6144:wB0z1N1FIUm/ZLbDMBvAJIUR8HOy7WqKuIm8yigE1/crn1EcvfSF7i4GpSh:wBg1GZLbDMSJIU4f80il1/I1l69h
Behavioral task
behavioral1
Sample
cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Users\Admin\Desktop\_READ_THI$_FILE_762JK_.txt
http://p27dokhpz2n7nvgr.onion/CEF0-96C6-BC48-0446-913A
http://p27dokhpz2n7nvgr.1nhkou.top/CEF0-96C6-BC48-0446-913A
http://p27dokhpz2n7nvgr.1a7wnt.top/CEF0-96C6-BC48-0446-913A
http://p27dokhpz2n7nvgr.1czh7o.top/CEF0-96C6-BC48-0446-913A
http://p27dokhpz2n7nvgr.1hpvzl.top/CEF0-96C6-BC48-0446-913A
http://p27dokhpz2n7nvgr.1pglcs.top/CEF0-96C6-BC48-0446-913A
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_READ_THI$_FILE_FKJD98O_.txt
http://p27dokhpz2n7nvgr.onion/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1nhkou.top/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1a7wnt.top/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1czh7o.top/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1hpvzl.top/5068-190B-D9AB-0446-98AB
http://p27dokhpz2n7nvgr.1pglcs.top/5068-190B-D9AB-0446-98AB
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_READ_THI$_FILE_IS0R_.hta
cerber
Targets
-
-
Target
cdc6b8390037fea52d1d56c41d1f088c_JaffaCakes118
-
Size
360KB
-
MD5
cdc6b8390037fea52d1d56c41d1f088c
-
SHA1
cf0aa31b75f4f174ad07455555a46d12df369b1a
-
SHA256
b68c8708e5cef34726f5114207ae90eb09176d723050725a2541834342b90742
-
SHA512
a53b4c80c1a164930ef9fe075e10944a0f89d109092fe6e5d434587d7e1bd88f954122082ee833b8b4b668796dc23afe3a4e0597c5ec5e071197805ecf21fdce
-
SSDEEP
6144:wB0z1N1FIUm/ZLbDMBvAJIUR8HOy7WqKuIm8yigE1/crn1EcvfSF7i4GpSh:wBg1GZLbDMSJIU4f80il1/I1l69h
-
Blocklisted process makes network request
-
Contacts a large (1097) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2