Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 00:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
db83044597e2b12bd8cf9a12d4870cce
-
SHA1
ead58ccb73af8b47bcdce50eb43525d3d5aea65e
-
SHA256
9b3acae6a6738003aa758af3e6a7c17164fb8f97b83df395a06d74e642db6992
-
SHA512
f61071eee3c48ac15769f8f850cb7eddf0dc47b9ca4a281cdc0af81b72bc5190099d01b126145d1a1ed0e5c7e3b33878d0a81b1d038372e44fa356db281cd8ea
-
SSDEEP
24576:uUZVeIOWJRH814FaLwNAQUQjC05y37G9vH9XimKJY85iMUEIs7YuPCp7Bb/W/+lU:uUZgduRutLwOcjCD36f9XimKJYGtTap4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4544 D.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvcrt.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File created C:\Windows\SysWOW64\msvcrt.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\VERSION.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File created C:\Windows\SysWOW64\VERSION.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ADVAPI32.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File created C:\Windows\SysWOW64\ADVAPI32.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\COMCTL32.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe File created C:\Windows\SysWOW64\COMCTL32.dll db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4544 D.exe 4544 D.exe 4544 D.exe 4544 D.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4804 wrote to memory of 4544 4804 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 83 PID 4804 wrote to memory of 4544 4804 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 83 PID 4804 wrote to memory of 4544 4804 db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe 83 PID 4544 wrote to memory of 3396 4544 D.exe 56 PID 4544 wrote to memory of 3396 4544 D.exe 56 PID 4544 wrote to memory of 3396 4544 D.exe 56 PID 4544 wrote to memory of 3396 4544 D.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544
-
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request25.140.123.92.in-addr.arpaIN PTRResponse25.140.123.92.in-addr.arpaIN PTRa92-123-140-25deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.143.123.92.in-addr.arpaIN PTRResponse240.143.123.92.in-addr.arpaIN PTRa92-123-143-240deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request31.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request130.109.69.13.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
25.140.123.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
240.143.123.92.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
31.243.111.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
130.109.69.13.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD57efc387017221960ae741fb41186c3ed
SHA19e7ee2862559f0387b5995fce5a2c9819b9cdecf
SHA2561dcbf21d4b5195c84e8776ef179c9d74c7f2f55fef3300ca841b634a722e3ede
SHA51231845d75fb72514f59c637138af45d1adc6e7b1f5a02ecb86aa8c8d94f0c5cc47ccf1fd54522aa3e9d0293415a581252c394ce17d44b3044a5480f12af01e0ed