Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe
-
Size
25KB
-
MD5
ef1a0e3331d4326c83f6838f9af96b1d
-
SHA1
1b98a249fd4a8980865c308d2ea9787438e28227
-
SHA256
05d249b7ce480e92a5ffe8c91e7028e92b7b7ff949c13c6469d38afb1d49ca94
-
SHA512
e3dd1b7256eace56277f1883036eceba04528d4246208cc57c6b9ad9cbed2951cfb683177699cbab7653d956130faadea0ea72af433c6f7b8d75c8a732edf41c
-
SSDEEP
384:vXHdxz0C0EKqd+1xYQ2S9pRrxdMulz5w6OyMdFggl8YCmXBadPEYH8:fcC03qdSaQf7Bxqulabl98dt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4048 chostbl.exe -
Loads dropped DLL 1 IoCs
pid Process 2244 svchost.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\q: chostbl.exe File opened (read-only) \??\r: chostbl.exe File opened (read-only) \??\x: chostbl.exe File opened (read-only) \??\e: chostbl.exe File opened (read-only) \??\m: chostbl.exe File opened (read-only) \??\w: chostbl.exe File opened (read-only) \??\y: chostbl.exe File opened (read-only) \??\i: chostbl.exe File opened (read-only) \??\s: chostbl.exe File opened (read-only) \??\l: chostbl.exe File opened (read-only) \??\o: chostbl.exe File opened (read-only) \??\p: chostbl.exe File opened (read-only) \??\v: chostbl.exe File opened (read-only) \??\h: chostbl.exe File opened (read-only) \??\j: chostbl.exe File opened (read-only) \??\n: chostbl.exe File opened (read-only) \??\t: chostbl.exe File opened (read-only) \??\u: chostbl.exe File opened (read-only) \??\z: chostbl.exe File opened (read-only) \??\g: chostbl.exe File opened (read-only) \??\k: chostbl.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\c:\autorun.inf chostbl.exe File opened for modification \??\c:\autorun.inf chostbl.exe File created \??\f:\autorun.inf chostbl.exe File opened for modification \??\f:\autorun.inf chostbl.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\chostbl.exe ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lovesbl.dll chostbl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies svchost.exe File created C:\Windows\SysWOW64\chostbl.exe ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe File created C:\Windows\SysWOW64\lovesbl.dll chostbl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 svchost.exe File created C:\Windows\SysWOW64\1.inf chostbl.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chostbl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 944 ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe 944 ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe 4048 chostbl.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4048 chostbl.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4656 4048 chostbl.exe 83 PID 4048 wrote to memory of 4656 4048 chostbl.exe 83 PID 4048 wrote to memory of 4656 4048 chostbl.exe 83 PID 4048 wrote to memory of 2244 4048 chostbl.exe 85 PID 4048 wrote to memory of 2244 4048 chostbl.exe 85 PID 4048 wrote to memory of 2244 4048 chostbl.exe 85 PID 4048 wrote to memory of 2244 4048 chostbl.exe 85 PID 4656 wrote to memory of 4824 4656 cmd.exe 86 PID 4656 wrote to memory of 4824 4656 cmd.exe 86 PID 4656 wrote to memory of 4824 4656 cmd.exe 86 PID 4824 wrote to memory of 3304 4824 net.exe 87 PID 4824 wrote to memory of 3304 4824 net.exe 87 PID 4824 wrote to memory of 3304 4824 net.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef1a0e3331d4326c83f6838f9af96b1d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:944
-
C:\Windows\SysWOW64\chostbl.exeC:\Windows\SysWOW64\chostbl.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:3304
-
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5ef1a0e3331d4326c83f6838f9af96b1d
SHA11b98a249fd4a8980865c308d2ea9787438e28227
SHA25605d249b7ce480e92a5ffe8c91e7028e92b7b7ff949c13c6469d38afb1d49ca94
SHA512e3dd1b7256eace56277f1883036eceba04528d4246208cc57c6b9ad9cbed2951cfb683177699cbab7653d956130faadea0ea72af433c6f7b8d75c8a732edf41c
-
Filesize
1.6MB
MD5e0e12856ca90be7f5ab8dfc0f0313078
SHA1cc5accf48b8e6c2fd39d1f800229cdbb54305518
SHA25681ec3e3c98e5f0af0dca21b9f08f2be445b46df2ca2354eaf3523bddcb125619
SHA512162c56367dca2291117f2391951970273969518b0db2bbc5d51c458173a8028c88d9dfd93aef01ed05b369f953e2953cc6be252daeb17556dbc33e5383900fa6
-
Filesize
87B
MD548167078ad3c858e3b7ff5397d5cc450
SHA1df8a4961b4cf5462ca6de00d4ffbe28675896663
SHA2563e972502a1707fe3494ceeb9d1432f9e54ecbab5631c7355e4de6ca1b7bb4279
SHA51224a16f36778e5fb99867ac25147248ba069233237b619782c886c6f5d2a95de91c8e2bb553b3f50a5bc78c7058b81f9807fdc46e1db4b746bcc1d74f89c57869