Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 07:18
Behavioral task
behavioral1
Sample
fbc7518bbfc4711c6ae1972891dbe7c6_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
fbc7518bbfc4711c6ae1972891dbe7c6_JaffaCakes118.exe
-
Size
295KB
-
MD5
fbc7518bbfc4711c6ae1972891dbe7c6
-
SHA1
ba97f5844951faa501eca586b7e5bf62b1a87667
-
SHA256
cd57d3a1736fa1a9a7fc25c8d3911a076d5ce1b65876cb65695d0a00bcec4452
-
SHA512
971204ff507a2fd479a767536db0fa6ca28a5805c6e632c4c020dd59b351c6457a0b76c5104304d38369bffcc0bc1a49e5fc88b87c5aaebd76de8285ac5d7985
-
SSDEEP
3072:uOXpHv1O0dCoutpmN32wePesy9B10l4LGIkTMjr7bY3SK9ydtL7qm8GmNCcEmAYs:XpvCoSwLLlqM/Y876m8aqWVZuo
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2984 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation fbc7518bbfc4711c6ae1972891dbe7c6_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Wifi Tecnhologies = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mssgnr.exe" reg.exe -
resource yara_rule behavioral2/memory/1780-0-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/1780-15-0x0000000000400000-0x000000000049C000-memory.dmp upx behavioral2/memory/1780-157-0x0000000000400000-0x000000000049C000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\lib\security\java.policy cmd.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\java.policy cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbc7518bbfc4711c6ae1972891dbe7c6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2984 reg.exe -
Runs .reg file with regedit 1 IoCs
pid Process 1704 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3148 1780 fbc7518bbfc4711c6ae1972891dbe7c6_JaffaCakes118.exe 82 PID 1780 wrote to memory of 3148 1780 fbc7518bbfc4711c6ae1972891dbe7c6_JaffaCakes118.exe 82 PID 1780 wrote to memory of 3148 1780 fbc7518bbfc4711c6ae1972891dbe7c6_JaffaCakes118.exe 82 PID 3148 wrote to memory of 4280 3148 cmd.exe 85 PID 3148 wrote to memory of 4280 3148 cmd.exe 85 PID 3148 wrote to memory of 4280 3148 cmd.exe 85 PID 3148 wrote to memory of 3804 3148 cmd.exe 86 PID 3148 wrote to memory of 3804 3148 cmd.exe 86 PID 3148 wrote to memory of 3804 3148 cmd.exe 86 PID 3148 wrote to memory of 2984 3148 cmd.exe 87 PID 3148 wrote to memory of 2984 3148 cmd.exe 87 PID 3148 wrote to memory of 2984 3148 cmd.exe 87 PID 3148 wrote to memory of 3132 3148 cmd.exe 88 PID 3148 wrote to memory of 3132 3148 cmd.exe 88 PID 3148 wrote to memory of 3132 3148 cmd.exe 88 PID 3132 wrote to memory of 3768 3132 cmd.exe 89 PID 3132 wrote to memory of 3768 3132 cmd.exe 89 PID 3132 wrote to memory of 3768 3132 cmd.exe 89 PID 3132 wrote to memory of 4020 3132 cmd.exe 90 PID 3132 wrote to memory of 4020 3132 cmd.exe 90 PID 3132 wrote to memory of 4020 3132 cmd.exe 90 PID 3148 wrote to memory of 1528 3148 cmd.exe 91 PID 3148 wrote to memory of 1528 3148 cmd.exe 91 PID 3148 wrote to memory of 1528 3148 cmd.exe 91 PID 3148 wrote to memory of 4868 3148 cmd.exe 92 PID 3148 wrote to memory of 4868 3148 cmd.exe 92 PID 3148 wrote to memory of 4868 3148 cmd.exe 92 PID 3148 wrote to memory of 3992 3148 cmd.exe 93 PID 3148 wrote to memory of 3992 3148 cmd.exe 93 PID 3148 wrote to memory of 3992 3148 cmd.exe 93 PID 3992 wrote to memory of 2308 3992 cmd.exe 94 PID 3992 wrote to memory of 2308 3992 cmd.exe 94 PID 3992 wrote to memory of 2308 3992 cmd.exe 94 PID 3992 wrote to memory of 3508 3992 cmd.exe 95 PID 3992 wrote to memory of 3508 3992 cmd.exe 95 PID 3992 wrote to memory of 3508 3992 cmd.exe 95 PID 3148 wrote to memory of 2416 3148 cmd.exe 96 PID 3148 wrote to memory of 2416 3148 cmd.exe 96 PID 3148 wrote to memory of 2416 3148 cmd.exe 96 PID 3148 wrote to memory of 2192 3148 cmd.exe 97 PID 3148 wrote to memory of 2192 3148 cmd.exe 97 PID 3148 wrote to memory of 2192 3148 cmd.exe 97 PID 3148 wrote to memory of 2652 3148 cmd.exe 98 PID 3148 wrote to memory of 2652 3148 cmd.exe 98 PID 3148 wrote to memory of 2652 3148 cmd.exe 98 PID 2652 wrote to memory of 840 2652 cmd.exe 99 PID 2652 wrote to memory of 840 2652 cmd.exe 99 PID 2652 wrote to memory of 840 2652 cmd.exe 99 PID 2652 wrote to memory of 2148 2652 cmd.exe 100 PID 2652 wrote to memory of 2148 2652 cmd.exe 100 PID 2652 wrote to memory of 2148 2652 cmd.exe 100 PID 3148 wrote to memory of 3712 3148 cmd.exe 108 PID 3148 wrote to memory of 3712 3148 cmd.exe 108 PID 3148 wrote to memory of 3712 3148 cmd.exe 108 PID 3712 wrote to memory of 2828 3712 cmd.exe 109 PID 3712 wrote to memory of 2828 3712 cmd.exe 109 PID 3712 wrote to memory of 2828 3712 cmd.exe 109 PID 3712 wrote to memory of 2684 3712 cmd.exe 110 PID 3712 wrote to memory of 2684 3712 cmd.exe 110 PID 3712 wrote to memory of 2684 3712 cmd.exe 110 PID 3148 wrote to memory of 1704 3148 cmd.exe 111 PID 3148 wrote to memory of 1704 3148 cmd.exe 111 PID 3148 wrote to memory of 1704 3148 cmd.exe 111 PID 3148 wrote to memory of 872 3148 cmd.exe 112 -
Views/modifies file attributes 1 TTPs 6 IoCs
pid Process 4868 attrib.exe 2416 attrib.exe 2192 attrib.exe 872 attrib.exe 2984 attrib.exe 1528 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbc7518bbfc4711c6ae1972891dbe7c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbc7518bbfc4711c6ae1972891dbe7c6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\71B5.tmp\antimalware.bat" "2⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "Wifi Tecnhologies" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\mssgnr.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4280
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /v "WarnonBadCertRecving" /t REG_DWORD /d "0x00000000" /f3⤵
- System Location Discovery: System Language Discovery
PID:3804
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir "\Users\Admin\.." /b /s | find "prefs.js"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" dir "\Users\Admin\.." /b /s "4⤵
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\find.exefind "prefs.js"4⤵
- System Location Discovery: System Language Discovery
PID:4020
-
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\system32\attrib.exe -r -a -s -h "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Background Tasks Profiles\o5napjtc.MozillaBackgroundTask-308046B0AF4A39CB-defaultagent\prefs.js"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1528
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\system32\attrib.exe -r -a -s -h "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5r4i2p4s.default-release\prefs.js"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir "\Users\Admin\.." /b /s | find "prefs.js"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" dir "\Users\Admin\.." /b /s "4⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\find.exefind "prefs.js"4⤵
- System Location Discovery: System Language Discovery
PID:3508
-
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\system32\attrib.exe -r -a -s -h "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Background Tasks Profiles\o5napjtc.MozillaBackgroundTask-308046B0AF4A39CB-defaultagent\prefs.js"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2416
-
-
C:\Windows\SysWOW64\attrib.exeC:\Windows\system32\attrib.exe -r -a -s -h "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5r4i2p4s.default-release\prefs.js"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /s | find /i "java.policy"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" dir /b /s "4⤵
- System Location Discovery: System Language Discovery
PID:840
-
-
C:\Windows\SysWOW64\find.exefind /i "java.policy"4⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c dir "C:\Program Files (x86)\" /b /s | find "mozalloc.dll"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" dir "C:\Program Files (x86)\" /b /s "4⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\SysWOW64\find.exefind "mozalloc.dll"4⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s "C:\Users\Admin\AppData\Roaming\Admin.reg"3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1704
-
-
C:\Windows\SysWOW64\attrib.exeAttrib -r -s -h C:\Windows\system32\drivers\etc\hosts3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:872
-
-
C:\Windows\SysWOW64\attrib.exeAttrib +r +h C:\Windows\system32\drivers\etc\hosts3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2984
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5a047b9925bfdbf4fd449fd81a72632f3
SHA1b03a2a30d5da0d8812edbbf6f76169ddd83edc51
SHA256768d77e9c377b4742259ab797c03901db2dfcd41f14c9c0dfbac11c4589c0822
SHA512cf072e7e1f55c668d79048bb0b4249a2e6a3f86921960c722d62a1b2416cd9d1bc4766181b1670cb5e713b8d8875922c1b41741c52170f646a29e506eb700cd6
-
Filesize
841B
MD54474639db2413f3bbd33d577a2534b90
SHA16abd666bb33925c352d8cfe72c108fe38ce536a5
SHA25682eba46bf33c09e9301112c94347980cb15564fed8985256c276a2ce4e3043e5
SHA512216f4e4f59ed2f81e8dce9640133964f9aa996c808ec301c4a81a4b1c0018a428ecc914fe7a218d60fdf92662fd58cc79a6ae788c388e6ba2f0dfbbaa41d39d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Background Tasks Profiles\o5napjtc.MozillaBackgroundTask-308046B0AF4A39CB-defaultagent\prefs.js
Filesize583B
MD5e59404946cf0f193535cda6f1ff77281
SHA1c7c118c60bc76e6ff645a49d3be065fcf68cc2ef
SHA2567b2502c43caca2980241a71d73fb1c566ab9f77a2fff3764c7488fd07c3351c7
SHA51211588816128648f72df3b31a9576a6cdb6aee31520a6357d0208da5f095e3ac31deb23ee108f49532a4d24173311eaf549ff4f16ce1182a05ef244c19db1ad77
-
Filesize
11KB
MD5a83cc19ba6dec96b6d3b7c8bacb3326c
SHA10d48b69f8be2fc26ccddf6c2b55ef1881e2846c3
SHA256fcda5b2faecc8dec74c1471a113528997e069c4741ed6174a6dba9eb857f8680
SHA5121d36913c211e9341b7ea88f8d0cd3672dcdfc553a4b39b2a9426c8e2f4802153cfd7fcae78f0defd585e800eec1770c182cd97e56958cb4232118dce430bd89a