Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe
-
Size
416KB
-
MD5
dd4c12c36bbd3a7fcb4c7368594d101d
-
SHA1
93cbd399d1aad149262b8df0cdd69e6cc2092e8e
-
SHA256
348e3e2a52ffed746bb90ddc3a2908fdc85c32fd2551d8c30223ed30290ad8a1
-
SHA512
49bd59e425a7116a6370fccaee8972df19f750a340254e9906be19153b7284c6f082f6b6b8e3e6168e72dfa4cf61f15b922cd3c4f196e94bfcaf58d076532798
-
SSDEEP
6144:GCkYKD36tLL3izjZqLnioYIzUs/P9yhfJRGkx/6Dq:M36tLLYjZYiIQMPgnx/Oq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4920 service.exe 3220 service.exe 2072 service.exe -
resource yara_rule behavioral2/memory/3220-20-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3220-23-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3220-25-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3220-29-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\service.exe" reg.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum service.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 service.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4920 set thread context of 3220 4920 service.exe 95 PID 3220 set thread context of 2072 3220 service.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 404 2072 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4328 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 4920 service.exe 3220 service.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4328 wrote to memory of 704 4328 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 86 PID 4328 wrote to memory of 704 4328 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 86 PID 4328 wrote to memory of 704 4328 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 86 PID 704 wrote to memory of 4736 704 cmd.exe 89 PID 704 wrote to memory of 4736 704 cmd.exe 89 PID 704 wrote to memory of 4736 704 cmd.exe 89 PID 4328 wrote to memory of 4920 4328 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 90 PID 4328 wrote to memory of 4920 4328 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 90 PID 4328 wrote to memory of 4920 4328 dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe 90 PID 4920 wrote to memory of 3220 4920 service.exe 95 PID 4920 wrote to memory of 3220 4920 service.exe 95 PID 4920 wrote to memory of 3220 4920 service.exe 95 PID 4920 wrote to memory of 3220 4920 service.exe 95 PID 4920 wrote to memory of 3220 4920 service.exe 95 PID 4920 wrote to memory of 3220 4920 service.exe 95 PID 4920 wrote to memory of 3220 4920 service.exe 95 PID 4920 wrote to memory of 3220 4920 service.exe 95 PID 3220 wrote to memory of 2072 3220 service.exe 96 PID 3220 wrote to memory of 2072 3220 service.exe 96 PID 3220 wrote to memory of 2072 3220 service.exe 96 PID 3220 wrote to memory of 2072 3220 service.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dd4c12c36bbd3a7fcb4c7368594d101d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240611921.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\service.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4736
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Roaming\Microsoft\service.exeC:\Users\Admin\AppData\Roaming\Microsoft\service.exe4⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 805⤵
- Program crash
PID:404
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 2072 -ip 20721⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146B
MD57eee65b102f30fd1ead48a8cd3b99827
SHA12f74a754019f280c6186c11531d460006814952e
SHA2565748c60056db288b67e61148b339778816279e36907977f4fe03b5df04f6b57f
SHA512a06de9e35ada579a95b2ba399e4c65b074d642788d456e10e0ae967896ac729c552f715261d9dc8c17fffca8d6b9144a6155ff11ab8569a82bdbd9d26109bd85
-
Filesize
416KB
MD51eb88ef5aa2533c25c88321907bd5224
SHA1e1efac481245f63dda807daace940205a21c319e
SHA2563f713418cb76c55dfed3c61ca4b939001e0ac0582de52482a38768289c3ac429
SHA512ec75dcd67d078ec33dd1c566752c76946f812f7d0c0f8690e5d3fa0ffad8565c5e5309db24afdc6c23c5eabbcdf0f7f9039349a20c97893cfbc59e723c441454