Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe
-
Size
68KB
-
MD5
e1f0a2e1c617969716c5c109b63058f4
-
SHA1
367da8f104e0ae6a2618c1bbb5936ce9b762730e
-
SHA256
c7fd39ff2b936104766c64c0b0b5c1d233b8630b0df757007a3e74f5b11344f0
-
SHA512
18d74f50f8bfda50b4d9bc936a03eaab69aacb6123697dfefe3401eeb915fb3bd75d7cc4cb095ce0fa155d67d550eba3af73e297fbac1b70ce6d343546b00a8b
-
SSDEEP
1536:uKupvclwH04kTEwAzAHPOo0mN1s0EakBQ:4iwRkTElAH2oLs0RkO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation winini.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 3196 syshost.exe 1992 winini.exe 1500 audiohd2.exe 2076 WUDHost2.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Local\\Temp\\syshost.exe" syshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows HD Audio Driver = "\"C:\\Windows\\system32\\audiohd2.exe\"" winini.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows HD Audio Driver = "\"C:\\Windows\\system32\\audiohd2.exe\"" audiohd2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\audiohd2.exe winini.exe File opened for modification C:\Windows\SysWOW64\audiohd2.exe winini.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\WUDHost2.exe winini.exe File opened for modification C:\Program Files (x86)\Common Files\WUDHost2.exe winini.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\syshost.exe:ZONE.identifier cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiohd2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WUDHost2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winini.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier audiohd2.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 WUDHost2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WUDHost2.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 winini.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winini.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 audiohd2.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\syshost.exe:ZONE.identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1992 winini.exe 1992 winini.exe 1992 winini.exe 1992 winini.exe 1992 winini.exe 1992 winini.exe 1992 winini.exe 1992 winini.exe 1500 audiohd2.exe 1500 audiohd2.exe 1500 audiohd2.exe 1500 audiohd2.exe 1500 audiohd2.exe 1500 audiohd2.exe 1500 audiohd2.exe 1500 audiohd2.exe 2076 WUDHost2.exe 2076 WUDHost2.exe 2076 WUDHost2.exe 2076 WUDHost2.exe 2076 WUDHost2.exe 2076 WUDHost2.exe 2076 WUDHost2.exe 2076 WUDHost2.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1992 winini.exe Token: SeDebugPrivilege 1500 audiohd2.exe Token: SeDebugPrivilege 2076 WUDHost2.exe Token: 33 1500 audiohd2.exe Token: SeIncBasePriorityPrivilege 1500 audiohd2.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3032 wrote to memory of 4548 3032 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 86 PID 3032 wrote to memory of 4548 3032 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 86 PID 3032 wrote to memory of 4548 3032 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 86 PID 4548 wrote to memory of 3612 4548 vbc.exe 88 PID 4548 wrote to memory of 3612 4548 vbc.exe 88 PID 4548 wrote to memory of 3612 4548 vbc.exe 88 PID 3032 wrote to memory of 1744 3032 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 89 PID 3032 wrote to memory of 1744 3032 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 89 PID 3032 wrote to memory of 1744 3032 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 89 PID 3032 wrote to memory of 3196 3032 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 91 PID 3032 wrote to memory of 3196 3032 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 91 PID 3032 wrote to memory of 3196 3032 e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe 91 PID 3196 wrote to memory of 1992 3196 syshost.exe 92 PID 3196 wrote to memory of 1992 3196 syshost.exe 92 PID 3196 wrote to memory of 1992 3196 syshost.exe 92 PID 1992 wrote to memory of 1500 1992 winini.exe 94 PID 1992 wrote to memory of 1500 1992 winini.exe 94 PID 1992 wrote to memory of 1500 1992 winini.exe 94 PID 1992 wrote to memory of 2076 1992 winini.exe 95 PID 1992 wrote to memory of 2076 1992 winini.exe 95 PID 1992 wrote to memory of 2076 1992 winini.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1f0a2e1c617969716c5c109b63058f4_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4i8dmtkt.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8B19.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc83E2CDCAA89F4DD89CB4F5CDB087A7CB.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:3612
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\syshost.exe"C:\Users\Admin\AppData\Local\Temp\syshost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\winini.exeC:\Users\Admin\AppData\Local\Temp\winini.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\audiohd2.exe"C:\Windows\system32\audiohd2.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Program Files (x86)\Common Files\WUDHost2.exe"C:\Program Files (x86)\Common Files\WUDHost2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Scripting
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD50fee7582e34d629e6ad570a2505310c3
SHA185287dd32fce2dddacde7c36d9f71c7494efef57
SHA25650a2fbd617437a9d84e0af61912a1eae1356f0764fee512bd1dd3ec18a27f33d
SHA51222eb48eee3a5d82cbb595a28b187f221e44de44b40482939ab339e6c49cad51f5fd4af5e7ea429d15e7b9ec2039819bff73df180ec56e1c563f0a1ac6927e155
-
Filesize
282B
MD55f5502d95297007ec4476bb1896a5383
SHA171ac02df8c2ae7d0dda8c865766aaaf9834e1f8a
SHA256463fbd2984a6813bb3258e086d17ade13ec66aa0db1e7dc1756fbc9357ca3c70
SHA51283f860998440859c5a3ee4dad367ceb05f2c4666050b7ce0ed72001c87ebce1f2852b0a3fb09218789e7ceea0cd49acfb45ee7fa71a31733089ab81529443cbc
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0
-
Filesize
1KB
MD5010091c4e65f06f2e29a6a672abc9eee
SHA1f4aacc1b5784c545213265b85b0171b0522d5ba8
SHA256863c6ae05b3e5dc653b86d619075c43bd1456205ce6b75386cec14a727a3ee4d
SHA5127c936ea030478f818bc776128d9d8c47f8aa6856cd0f56ef1f8564dec711c1bb2210d09bb64234ba679f85f17994bdca8a5a9df11996fde8bd65a74e615768fd
-
Filesize
6KB
MD586b538b243b4629ebb31daa1eb5fe1af
SHA158c73c3ce512b75ec4a0ec984e8300020b1fccfc
SHA25699940f44cd605300f3ab0c7a68532529f0b345ec0902533d7bddb066ed896176
SHA51257a71226782392b094ca8e1b5ee03056231fba791cd58a739be9b4b6bbca27746b669fb2c74240480f3c2416c6b9a920eb307b0a7bca26eb0955818da591a343
-
Filesize
27B
MD5130a75a932a2fe57bfea6a65b88da8f6
SHA1b66d7530d150d45c0a390bb3c2cd4ca4fc404d1c
SHA256f2b79cae559d6772afc1c2ed9468988178f8b6833d5028a15dea73ce47d0196e
SHA5126cd147c6f3af95803b7b0898e97ec2ed374c1f56a487b50e3d22003a67cec26a6fa12a3920b1b5624bde156f9601469ae3c7b7354fa8cf37be76c84121767eed
-
Filesize
644B
MD54f8bcd6bbee4ce68c276a906343677a9
SHA17e9ba9d96ee307ab231a25e8bd2544ecbbf0715b
SHA2560b967aac9c131c4b91153a427ba445474b3947619c4ec2783d81db3fed646e65
SHA5126688d05e38ef58c3e14fbb332464de42a75f618ee4cefe30a0e0c3cbbf6077390a3846254645b5edacaac1b6560d57e151b60680f162b4a7f7faa4fdc792ab9b
-
Filesize
68KB
MD5e1f0a2e1c617969716c5c109b63058f4
SHA1367da8f104e0ae6a2618c1bbb5936ce9b762730e
SHA256c7fd39ff2b936104766c64c0b0b5c1d233b8630b0df757007a3e74f5b11344f0
SHA51218d74f50f8bfda50b4d9bc936a03eaab69aacb6123697dfefe3401eeb915fb3bd75d7cc4cb095ce0fa155d67d550eba3af73e297fbac1b70ce6d343546b00a8b