Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 15:28
Behavioral task
behavioral1
Sample
d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe
-
Size
52KB
-
MD5
d6991ed520bb71033a36d94509f44c07
-
SHA1
f2c4c6c27fdf63dc6adedf197d4731d863272ec8
-
SHA256
46dc099e6e92e1de7e64fff9b66073008148e803ff931218bff0786ee6fae405
-
SHA512
360ba7088dada96d48e0c7749eb15d1baaa29a84cf70b66c228b643ac000d41d2b5da4f9337553690cd386ec6a76ee88561c0045a43a5448be9a3cd0313993ff
-
SSDEEP
768:LXsboeblozOtvdnHmw8DAQFU02mgWkXDCncoh+aHSTzavkLD5x5DPH6ui7gt1r7j:Ls36nO00VCncyHQHLDVz6Ut1CsWSK
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Beep.sys d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers\Beep.sys vmdetdhc.exe -
Executes dropped EXE 1 IoCs
pid Process 764 vmdetdhc.exe -
resource yara_rule behavioral2/memory/1188-0-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/files/0x00080000000233bc-5.dat upx behavioral2/memory/1188-12-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/764-10-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vmdetdhc.exe = "C:\\Windows\\system32\\vmdetdhc.exe" d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vmdetdhc.exe = "C:\\Windows\\system32\\vmdetdhc.exe" vmdetdhc.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\vmdetdhc.exe d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vmdetdhc.exe vmdetdhc.exe File opened for modification C:\Windows\SysWOW64\vmdetdhc.exe d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ResetTest.txt d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmdetdhc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1188 d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe 1188 d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe 764 vmdetdhc.exe 764 vmdetdhc.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1188 wrote to memory of 764 1188 d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe 83 PID 1188 wrote to memory of 764 1188 d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe 83 PID 1188 wrote to memory of 764 1188 d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe 83 PID 764 wrote to memory of 3564 764 vmdetdhc.exe 84 PID 764 wrote to memory of 3564 764 vmdetdhc.exe 84 PID 764 wrote to memory of 3564 764 vmdetdhc.exe 84 PID 1188 wrote to memory of 4276 1188 d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe 85 PID 1188 wrote to memory of 4276 1188 d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe 85 PID 1188 wrote to memory of 4276 1188 d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\vmdetdhc.exeC:\Windows\system32\vmdetdhc.exe -Start2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.execmd /c erase /F /A "C:\Windows\SysWOW64\vmdetdhc.exe" > nul3⤵
- System Location Discovery: System Language Discovery
PID:3564
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F /A "C:\Users\Admin\AppData\Local\Temp\d6991ed520bb71033a36d94509f44c07_JaffaCakes118.exe" > nul2⤵
- System Location Discovery: System Language Discovery
PID:4276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD52c3482aa3bf0a80b04d1ae28432d508a
SHA1b13c9a85e5d09438e9f201f3ea0a94b7b087c6a3
SHA256e31f235499693b0a217e47426f591d4c946453a5db918ba7727159b4cae992ce
SHA5121de92c90b7c8aa049dc8eece40363aef214830cf24c5e83ae33253d10c071a3ea68b7e6f7832743c5de177cdfb5843c2dd3dd78dae5c3cffdec3b42203921ea9
-
Filesize
52KB
MD5d6991ed520bb71033a36d94509f44c07
SHA1f2c4c6c27fdf63dc6adedf197d4731d863272ec8
SHA25646dc099e6e92e1de7e64fff9b66073008148e803ff931218bff0786ee6fae405
SHA512360ba7088dada96d48e0c7749eb15d1baaa29a84cf70b66c228b643ac000d41d2b5da4f9337553690cd386ec6a76ee88561c0045a43a5448be9a3cd0313993ff