Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe
-
Size
148KB
-
MD5
fd19d54287d984c899908a7c341dbc06
-
SHA1
a66e77d6f13d3af4ad1476246c637d4c04d65633
-
SHA256
da135b38df8b6d87ecd98079b56eae725ae22e1846c14f4e0ed7a75a2290cdc8
-
SHA512
196ec8bfb24f24c85d5e05b60c9aed7e39b5e2480d3d8dddc5fec9f6f27cab85682ee5d86a5e5a0ffe9f0b9c61ea49737fa55d668221c427e44fefbe87ecde41
-
SSDEEP
3072:uiIroK9w8wZD9JS8ougbDz/KCwvlcH2GK39jqj0lRtDIv:uixxD8bDzSvlOXm9jTlRt8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4004 svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 1068 net.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 4004 svchost.exe 4004 svchost.exe 4004 svchost.exe 4004 svchost.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeShutdownPrivilege 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe Token: SeShutdownPrivilege 4004 svchost.exe Token: SeCreatePagefilePrivilege 4004 svchost.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe Token: SeDebugPrivilege 5072 whoami.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 436 wrote to memory of 4004 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 83 PID 436 wrote to memory of 4004 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 83 PID 436 wrote to memory of 4004 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 83 PID 436 wrote to memory of 4004 436 fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe 83 PID 4004 wrote to memory of 5072 4004 svchost.exe 84 PID 4004 wrote to memory of 5072 4004 svchost.exe 84 PID 4004 wrote to memory of 5072 4004 svchost.exe 84 PID 4004 wrote to memory of 1068 4004 svchost.exe 86 PID 4004 wrote to memory of 1068 4004 svchost.exe 86 PID 4004 wrote to memory of 1068 4004 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe "C:\Users\Admin\AppData\Local\Temp\fd19d54287d984c899908a7c341dbc06_JaffaCakes118.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\whoami.exeC:\Windows\system32\whoami.exe /all3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe view3⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:1068
-
-