Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
57s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe
-
Size
103KB
-
MD5
cfda539c20c2d2b2b8b803391f6e820a
-
SHA1
f80de74aa959ea46c311015aba74992ef11cc5b8
-
SHA256
f47cd1ff216eabb2bc0a777f9c827c2975b69133d31570b6d8114f9cada3361e
-
SHA512
1b9ccee60b813e352b24c7930c7398775ef6688c38484ee5e5a90337a17faf6667c12288e3cdf83c161a9ebdb2ed94a009a898c8b454fedb000669ed5cd56ec8
-
SSDEEP
3072:F0+ODLbYZIhbiwcg0QaTEFXc6HjS2aUsc6HcT66vlmQ90TDyrPGvLvHjvfrH/zjo:xcbYZquwr0VTEFXc6HjdaUsc6HcT66vd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\svhosts.exe cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svhosts.exe cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cfda539c20c2d2b2b8b803391f6e820a_JaffaCakes118.exe"1⤵
- UAC bypass
- Modifies system executable filetype association
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- System policy modification
PID:2020
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD5cfda539c20c2d2b2b8b803391f6e820a
SHA1f80de74aa959ea46c311015aba74992ef11cc5b8
SHA256f47cd1ff216eabb2bc0a777f9c827c2975b69133d31570b6d8114f9cada3361e
SHA5121b9ccee60b813e352b24c7930c7398775ef6688c38484ee5e5a90337a17faf6667c12288e3cdf83c161a9ebdb2ed94a009a898c8b454fedb000669ed5cd56ec8