Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe
-
Size
174KB
-
MD5
fad9a80024332efb7f5609b61c00ff56
-
SHA1
31e2caada015dcbb888dd351f06474d7177437a1
-
SHA256
e746832c45b60f90fefd8738d0d9540df167674fbf101dd9b974b966cde62457
-
SHA512
80599d1cebe327d7cb6bab1ce88dec2b0a35310b48e1d2784cb1685eec2456602fd7a965b5194e5499345a63d237dc252013bf3b877e5079860e6874b7fb8acb
-
SSDEEP
3072:2a6pmM3xy6bpgy4Zyv7q6RYZZeyqfEkQGUSQyYLWwA5pyAQ/NxgSiD9s8FlI6:wy62y4ZI7qoYXizQGUhfK5pVQ/M52
Malware Config
Signatures
-
Event Triggered Execution: AppCert DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe -
Loads dropped DLL 4 IoCs
pid Process 1384 fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe 4324 Process not Found 4136 rundll32.exe 4652 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Credtvol.dll fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe File opened for modification C:\Windows\system32\Credtvol64.dll fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1084 4652 WerFault.exe 93 4688 4652 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1384 fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe 1384 fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1384 wrote to memory of 4136 1384 fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe 86 PID 1384 wrote to memory of 4136 1384 fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe 86 PID 1384 wrote to memory of 4652 1384 fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe 93 PID 1384 wrote to memory of 4652 1384 fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe 93 PID 1384 wrote to memory of 4652 1384 fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2280 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\Credtvol64.dll",CreateProcessNotify2⤵
- Loads dropped DLL
PID:4136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240639031.bat" "C:\Users\Admin\AppData\Local\Temp\fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4652 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h"C:\Users\Admin\AppData\Local\Temp\fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:2280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 4923⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 5283⤵
- Program crash
PID:4688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1384 -ip 13841⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4652 -ip 46521⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4652 -ip 46521⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75B
MD517382142b2ccb199865f2a1b5ca42dc8
SHA15a13d091b08402c4fcbb46abd4fff313967bf858
SHA2565cceceac5650fcd9273a5a5b54686b2036da073e870b191cf10db2ad0270bb40
SHA5124f217b614e52805ee27bbc2b90be81ead04b528b09e15d063cb32c280a970255dec3dffb72c50e3c209c154b5000452e245f7f7e2f407258a2e9715d9bd25a00
-
Filesize
54KB
MD56564e07076dda55f1da5ccc8c40edeb8
SHA1ef685e0491fe98a92ee4df180869f0c9cad95f98
SHA25662d1e48d0bd38236c7f679da0f81760f91b44ae28310b4a4c53ff231238dd0d7
SHA5122a6b0d35f5de4962be5f2d5f7d8d98a41915b1f24910a256760ec9d18719945d0aa0b335549f9338e8fc477d655c92e0579ce437c5d171502fd1746866a1d326
-
Filesize
62KB
MD5d99463764fb1cb6608f2e2fea36bb016
SHA187a5518f3ef2db86930ed355d5b4f81362bd6418
SHA2568557f233873fd2aa7bb675e48ac58d7d5fd60470033ad26660352bdbbacae65f
SHA512268f9869d6fdc5673bc6fd6ef80e7b697bf172913b249b8b8626738eda387097ea00f6f5af7af56a60c8409f3bcc634502fa22599081c998874b9d5fa9a44938