Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe
-
Size
323KB
-
MD5
cfe24cb8838f20a224f66b81d359aa8e
-
SHA1
053ee9b49573c3141d322ddf848fa204b0ba2c98
-
SHA256
0ec20e64500f44e2e6522780231260a0f23f39ef575e5d76279029b539d49a5d
-
SHA512
a35f395d1e30e3833d5134722745e352ccd477bed63f00b1ec427a150231f5f88470ea80c7fcd3ec783a0b40e9d9b951f0a17bc919ad8942e0634fe879aa755d
-
SSDEEP
6144:jB0DFutpHEBEbBiE5tfFwQVXS948MjuNU7MqKep8cR0GHK2Xny/7Dqdf/aS:jB0DFqF7BiCttwaa48MjuNKMM30R2ioz
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svlhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\system = "C:\\Windows\\csrss.exe" svlhost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation svlhost.exe -
Executes dropped EXE 3 IoCs
pid Process 2476 svlhost.exe 4100 imtale.exe 3364 csrss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\csrss.exe svlhost.exe File opened for modification C:\Windows\csrss.exe svlhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svlhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language imtale.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svlhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2476 svlhost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4492 wrote to memory of 2476 4492 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 83 PID 4492 wrote to memory of 2476 4492 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 83 PID 4492 wrote to memory of 2476 4492 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 83 PID 4492 wrote to memory of 4100 4492 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 85 PID 4492 wrote to memory of 4100 4492 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 85 PID 4492 wrote to memory of 4100 4492 cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe 85 PID 2476 wrote to memory of 3364 2476 svlhost.exe 90 PID 2476 wrote to memory of 3364 2476 svlhost.exe 90 PID 2476 wrote to memory of 3364 2476 svlhost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cfe24cb8838f20a224f66b81d359aa8e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\svlhost.exe"C:\Users\Admin\AppData\Local\Temp\svlhost.exe"2⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3364
-
-
-
C:\Users\Admin\AppData\Local\Temp\imtale.exe"C:\Users\Admin\AppData\Local\Temp\imtale.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD5552acc406360f7844e79a3e6e3a859c8
SHA1725cb325e53feaccff739f4fc86762dd5c5503cc
SHA2568cf03331eaecd93d76103d62b04edcbd6593bd1c618b9137ca4d355a2936e848
SHA51294dc4c1e09e80687d684743399983d56d432a02fda52cce4e0e23660886f1ab6501f2ced80c4e9024e63d6f8d56d952f8621c8ade6d9bca0876eb3ddf68ce3e6
-
Filesize
24KB
MD5d4abdf905ff4b7936e66eaa4307c9c8a
SHA1f6fcd7b087624f91586d8323efe2eaddb346492f
SHA256e02097bba3ca04097d16766361e602366636a79f780fde28ba8ffe69aae2dc9d
SHA512adb51faf55692cc25d6bdf5412efbacc932c5c2842a0d1668c2ecb4cacbc27fd9dc8fe4949dcfde5030ac589493a9081ee41f0b8daca8880654d62d91e150194