Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 01:41
Static task
static1
Behavioral task
behavioral1
Sample
e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe
-
Size
513KB
-
MD5
e174a81d3a5acbb08094c63102f38e76
-
SHA1
a0c3be456bb4eeb5c76c7896df3ba511f0905fda
-
SHA256
b676c82353948f50f7e978b317f1633903c5a03a99b659bcb0395109b05f6012
-
SHA512
244df2d51138ba8832ec9109294d438cb986f46b10b94477443f8c723581c0f82d374d672234cc6f736a682304838b240d7ffcdb91124f1b7ac24a530b4570c3
-
SSDEEP
12288:B1xd8PIcO+kOmZ2xd8PIcO+kOmZcIztkolugFnJ7:BdMk+kbUMk+kbcXobJ7
Malware Config
Extracted
formbook
3.9
fr
comptonbusinesschamber.com
roxanalabrador.com
orid.ltd
sbeaney.com
4petstuff.com
smartquality-preprod.com
vlach.site
salao-brasil.com
lindenrealty.net
redvinci.com
yellowdragster.com
fancygalaccessories.com
scalaweb.win
ditrabook.com
adler-willisau.com
dszongbu.com
mz-inc.info
mollymormons.com
financialbooster.info
nanmuxiehui.com
xn--uisr0m8san39f.com
ballbic.com
gjconsults.com
surfwon.com
silversailtourism.biz
52eea.com
theauroradiscourse.com
d5725.com
tempo-gr.com
deartea.review
sp-456.com
feededhaha.com
giftclub.win
ahcpyb.com
berita-it.info
tiandigame.com
dubai-offplan.net
allaboutthefreight.com
chevalint.com
gupala.com
mygoshen.com
184.salon
bajahomeimprovement.com
thrive.store
relianceportsandterminals.com
bushelsandoceans.com
candle.land
planetdesloisirs.com
vspreestudios.com
erima-sport.com
perfectmomentseventhire.com
2nuworld.com
ltwtech.com
nicholerileyart.com
amtrop.com
carsonperry.com
holemanbrothers.net
tekeltutunu.com
eagledetailers.com
travelfitcentral.com
inneart.com
subprocuraduriaseido.com
newmethoddesign.net
longbrookcapital.net
smaleg.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4344-27-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation logsx.exe -
Executes dropped EXE 2 IoCs
pid Process 4412 logsx.exe 4344 logsx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\logs = "C:\\Users\\Admin\\AppData\\Local\\logsx.exe -boot" logsx.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4412 set thread context of 4344 4412 logsx.exe 108 PID 4344 set thread context of 3392 4344 logsx.exe 55 PID 4212 set thread context of 3392 4212 mstsc.exe 55 -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 4 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\logsx.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\logsx.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe:Zone.Identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language logsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
NTFS ADS 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Local\logsx.exe\:Zone.Identifier:$DATA cmd.exe File opened for modification C:\Users\Admin\AppData\Local\logsx.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\logsx.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4344 logsx.exe 4344 logsx.exe 4344 logsx.exe 4344 logsx.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe 4212 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4344 logsx.exe 4344 logsx.exe 4344 logsx.exe 4212 mstsc.exe 4212 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe Token: SeDebugPrivilege 4412 logsx.exe Token: SeDebugPrivilege 4344 logsx.exe Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeDebugPrivilege 4212 mstsc.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3392 Explorer.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 548 wrote to memory of 3224 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 93 PID 548 wrote to memory of 3224 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 93 PID 548 wrote to memory of 3224 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 93 PID 548 wrote to memory of 4548 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 95 PID 548 wrote to memory of 4548 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 95 PID 548 wrote to memory of 4548 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 95 PID 548 wrote to memory of 4392 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 97 PID 548 wrote to memory of 4392 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 97 PID 548 wrote to memory of 4392 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 97 PID 548 wrote to memory of 632 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 101 PID 548 wrote to memory of 632 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 101 PID 548 wrote to memory of 632 548 e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe 101 PID 632 wrote to memory of 4412 632 cmd.exe 103 PID 632 wrote to memory of 4412 632 cmd.exe 103 PID 632 wrote to memory of 4412 632 cmd.exe 103 PID 4412 wrote to memory of 3544 4412 logsx.exe 104 PID 4412 wrote to memory of 3544 4412 logsx.exe 104 PID 4412 wrote to memory of 3544 4412 logsx.exe 104 PID 4412 wrote to memory of 2020 4412 logsx.exe 106 PID 4412 wrote to memory of 2020 4412 logsx.exe 106 PID 4412 wrote to memory of 2020 4412 logsx.exe 106 PID 4412 wrote to memory of 4344 4412 logsx.exe 108 PID 4412 wrote to memory of 4344 4412 logsx.exe 108 PID 4412 wrote to memory of 4344 4412 logsx.exe 108 PID 4412 wrote to memory of 4344 4412 logsx.exe 108 PID 4412 wrote to memory of 4344 4412 logsx.exe 108 PID 4412 wrote to memory of 4344 4412 logsx.exe 108 PID 3392 wrote to memory of 4212 3392 Explorer.EXE 109 PID 3392 wrote to memory of 4212 3392 Explorer.EXE 109 PID 3392 wrote to memory of 4212 3392 Explorer.EXE 109 PID 4212 wrote to memory of 3828 4212 mstsc.exe 110 PID 4212 wrote to memory of 3828 4212 mstsc.exe 110 PID 4212 wrote to memory of 3828 4212 mstsc.exe 110
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe:Zone.Identifier"3⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe:Zone.Identifier"3⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\e174a81d3a5acbb08094c63102f38e76_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\logsx.exe"3⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:4392
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\logsx.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\logsx.exe"C:\Users\Admin\AppData\Local\logsx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\logsx.exe:Zone.Identifier"5⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:3544
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\logsx.exe:Zone.Identifier"5⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2020
-
-
C:\Users\Admin\AppData\Local\logsx.exe"C:\Users\Admin\AppData\Local\logsx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\logsx.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3828
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
513KB
MD5e174a81d3a5acbb08094c63102f38e76
SHA1a0c3be456bb4eeb5c76c7896df3ba511f0905fda
SHA256b676c82353948f50f7e978b317f1633903c5a03a99b659bcb0395109b05f6012
SHA512244df2d51138ba8832ec9109294d438cb986f46b10b94477443f8c723581c0f82d374d672234cc6f736a682304838b240d7ffcdb91124f1b7ac24a530b4570c3