Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 10:41
Behavioral task
behavioral1
Sample
fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe
-
Size
118KB
-
MD5
fc1f83cc71b05b246c6866138e9e19ec
-
SHA1
6c43d2ce3201d52359a6f584c17761c32e807430
-
SHA256
6a12a3379a5dd7ecd513993e7fb3d2c4d8ff64f4e879c9dc84e86866b7362238
-
SHA512
a6b9bfd42d635a7481688592c336c6d30f8e7913b84c09799e09e819ef54a6ecca57c4be12041a1ed0a4a53ad4db703980a289ca15ebe4eb2309272fe322ef96
-
SSDEEP
3072:+4dMdZPdsKUEJ4Zlta/KiG8laQZwN4hDW/pout:+iuZPsA4ZH+KikQa4hDWhoS
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 4816 vhost.exe 2012 vhost.exe 3848 vhost.exe 1820 vhost.exe 2564 vhost.exe 1732 vhost.exe 4108 vhost.exe 1888 vhost.exe 2996 vhost.exe 4864 vhost.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vhost.exe fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File opened for modification C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe File created C:\Windows\SysWOW64\vhost.exe vhost.exe -
resource yara_rule behavioral2/memory/2368-0-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/files/0x0009000000023457-5.dat upx behavioral2/memory/2368-7-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/4816-8-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/2012-11-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/3848-14-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/1820-17-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/2564-20-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/1732-23-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/4108-26-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/1888-29-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/2996-32-0x0000000000400000-0x00000000004AA000-memory.dmp upx behavioral2/memory/4864-35-0x0000000000400000-0x00000000004AA000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2368 wrote to memory of 4816 2368 fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe 82 PID 2368 wrote to memory of 4816 2368 fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe 82 PID 2368 wrote to memory of 4816 2368 fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe 82 PID 4816 wrote to memory of 2012 4816 vhost.exe 88 PID 4816 wrote to memory of 2012 4816 vhost.exe 88 PID 4816 wrote to memory of 2012 4816 vhost.exe 88 PID 2012 wrote to memory of 3848 2012 vhost.exe 92 PID 2012 wrote to memory of 3848 2012 vhost.exe 92 PID 2012 wrote to memory of 3848 2012 vhost.exe 92 PID 3848 wrote to memory of 1820 3848 vhost.exe 94 PID 3848 wrote to memory of 1820 3848 vhost.exe 94 PID 3848 wrote to memory of 1820 3848 vhost.exe 94 PID 1820 wrote to memory of 2564 1820 vhost.exe 95 PID 1820 wrote to memory of 2564 1820 vhost.exe 95 PID 1820 wrote to memory of 2564 1820 vhost.exe 95 PID 2564 wrote to memory of 1732 2564 vhost.exe 96 PID 2564 wrote to memory of 1732 2564 vhost.exe 96 PID 2564 wrote to memory of 1732 2564 vhost.exe 96 PID 1732 wrote to memory of 4108 1732 vhost.exe 97 PID 1732 wrote to memory of 4108 1732 vhost.exe 97 PID 1732 wrote to memory of 4108 1732 vhost.exe 97 PID 4108 wrote to memory of 1888 4108 vhost.exe 98 PID 4108 wrote to memory of 1888 4108 vhost.exe 98 PID 4108 wrote to memory of 1888 4108 vhost.exe 98 PID 1888 wrote to memory of 2996 1888 vhost.exe 99 PID 1888 wrote to memory of 2996 1888 vhost.exe 99 PID 1888 wrote to memory of 2996 1888 vhost.exe 99 PID 2996 wrote to memory of 4864 2996 vhost.exe 100 PID 2996 wrote to memory of 4864 2996 vhost.exe 100 PID 2996 wrote to memory of 4864 2996 vhost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1084 "C:\Users\Admin\AppData\Local\Temp\fc1f83cc71b05b246c6866138e9e19ec_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1164 "C:\Windows\SysWOW64\vhost.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1136 "C:\Windows\SysWOW64\vhost.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1132 "C:\Windows\SysWOW64\vhost.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1144 "C:\Windows\SysWOW64\vhost.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1128 "C:\Windows\SysWOW64\vhost.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1152 "C:\Windows\SysWOW64\vhost.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1156 "C:\Windows\SysWOW64\vhost.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1140 "C:\Windows\SysWOW64\vhost.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\vhost.exeC:\Windows\system32\vhost.exe 1168 "C:\Windows\SysWOW64\vhost.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4864
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5fc1f83cc71b05b246c6866138e9e19ec
SHA16c43d2ce3201d52359a6f584c17761c32e807430
SHA2566a12a3379a5dd7ecd513993e7fb3d2c4d8ff64f4e879c9dc84e86866b7362238
SHA512a6b9bfd42d635a7481688592c336c6d30f8e7913b84c09799e09e819ef54a6ecca57c4be12041a1ed0a4a53ad4db703980a289ca15ebe4eb2309272fe322ef96