Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe
-
Size
190KB
-
MD5
ff86be0847452874121d6e19d5d300d5
-
SHA1
fc7ca5c1dc9e430bc11ae1a48e2e64258d83bb4d
-
SHA256
e339dbe533c1a513a587f7530c821d2578a2fc9b8d1871bb958ee533267ceecf
-
SHA512
d8fc3ec9568025fa7ca1b6c89255015c87e5dd16cca0da7ea3f8c68fadb88e4329c3e7a69adc35109d17b2c51406ce72d7f184fbdb66d302ca4a9e2f62360305
-
SSDEEP
3072:nGyavt1Giv9QQ60BMaNp11b6GWeO+WOQYM2ZqrhemlKjzHl/16MZS4eD:nfaLGimaMaNrgjeO+WODEhemlKXlfZHe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 412 KB00060670.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KB00060670.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\KB00060670.exe\"" ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1032 4412 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KB00060670.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 412 KB00060670.exe 412 KB00060670.exe 4412 cmd.exe 4412 cmd.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe 412 KB00060670.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 412 KB00060670.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 412 4876 ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe 82 PID 4876 wrote to memory of 412 4876 ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe 82 PID 4876 wrote to memory of 412 4876 ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe 82 PID 4876 wrote to memory of 4412 4876 ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe 83 PID 4876 wrote to memory of 4412 4876 ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe 83 PID 4876 wrote to memory of 4412 4876 ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe 83 PID 412 wrote to memory of 2648 412 KB00060670.exe 44 PID 412 wrote to memory of 2648 412 KB00060670.exe 44 PID 412 wrote to memory of 2648 412 KB00060670.exe 44 PID 412 wrote to memory of 2648 412 KB00060670.exe 44 PID 412 wrote to memory of 2648 412 KB00060670.exe 44 PID 412 wrote to memory of 2664 412 KB00060670.exe 45 PID 412 wrote to memory of 2664 412 KB00060670.exe 45 PID 412 wrote to memory of 2664 412 KB00060670.exe 45 PID 412 wrote to memory of 2664 412 KB00060670.exe 45 PID 412 wrote to memory of 2664 412 KB00060670.exe 45 PID 412 wrote to memory of 2804 412 KB00060670.exe 47 PID 412 wrote to memory of 2804 412 KB00060670.exe 47 PID 412 wrote to memory of 2804 412 KB00060670.exe 47 PID 412 wrote to memory of 2804 412 KB00060670.exe 47 PID 412 wrote to memory of 2804 412 KB00060670.exe 47 PID 412 wrote to memory of 3500 412 KB00060670.exe 56 PID 412 wrote to memory of 3500 412 KB00060670.exe 56 PID 412 wrote to memory of 3500 412 KB00060670.exe 56 PID 412 wrote to memory of 3500 412 KB00060670.exe 56 PID 412 wrote to memory of 3500 412 KB00060670.exe 56 PID 412 wrote to memory of 3688 412 KB00060670.exe 57 PID 412 wrote to memory of 3688 412 KB00060670.exe 57 PID 412 wrote to memory of 3688 412 KB00060670.exe 57 PID 412 wrote to memory of 3688 412 KB00060670.exe 57 PID 412 wrote to memory of 3688 412 KB00060670.exe 57 PID 412 wrote to memory of 3856 412 KB00060670.exe 58 PID 412 wrote to memory of 3856 412 KB00060670.exe 58 PID 412 wrote to memory of 3856 412 KB00060670.exe 58 PID 412 wrote to memory of 3856 412 KB00060670.exe 58 PID 412 wrote to memory of 3856 412 KB00060670.exe 58 PID 412 wrote to memory of 4040 412 KB00060670.exe 59 PID 412 wrote to memory of 4040 412 KB00060670.exe 59 PID 412 wrote to memory of 4040 412 KB00060670.exe 59 PID 412 wrote to memory of 4040 412 KB00060670.exe 59 PID 412 wrote to memory of 4040 412 KB00060670.exe 59 PID 412 wrote to memory of 3020 412 KB00060670.exe 60 PID 412 wrote to memory of 3020 412 KB00060670.exe 60 PID 412 wrote to memory of 3020 412 KB00060670.exe 60 PID 412 wrote to memory of 3020 412 KB00060670.exe 60 PID 412 wrote to memory of 3020 412 KB00060670.exe 60 PID 412 wrote to memory of 2192 412 KB00060670.exe 61 PID 412 wrote to memory of 2192 412 KB00060670.exe 61 PID 412 wrote to memory of 2192 412 KB00060670.exe 61 PID 412 wrote to memory of 2192 412 KB00060670.exe 61 PID 412 wrote to memory of 2192 412 KB00060670.exe 61 PID 412 wrote to memory of 4028 412 KB00060670.exe 62 PID 412 wrote to memory of 4028 412 KB00060670.exe 62 PID 412 wrote to memory of 4028 412 KB00060670.exe 62 PID 412 wrote to memory of 4028 412 KB00060670.exe 62 PID 412 wrote to memory of 4028 412 KB00060670.exe 62 PID 412 wrote to memory of 4612 412 KB00060670.exe 64 PID 412 wrote to memory of 4612 412 KB00060670.exe 64 PID 412 wrote to memory of 4612 412 KB00060670.exe 64 PID 412 wrote to memory of 4612 412 KB00060670.exe 64 PID 412 wrote to memory of 4612 412 KB00060670.exe 64 PID 412 wrote to memory of 3292 412 KB00060670.exe 76 PID 412 wrote to memory of 3292 412 KB00060670.exe 76 PID 412 wrote to memory of 3292 412 KB00060670.exe 76
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2664
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2804
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff86be0847452874121d6e19d5d300d5_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Roaming\KB00060670.exe"C:\Users\Admin\AppData\Roaming\KB00060670.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:412
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\POSA6FE.tmp.BAT"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4412 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 3924⤵
- Program crash
PID:1032
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3688
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3856
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4040
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3020
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2192
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4028
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4612
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4412 -ip 44121⤵PID:1548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190KB
MD5ff86be0847452874121d6e19d5d300d5
SHA1fc7ca5c1dc9e430bc11ae1a48e2e64258d83bb4d
SHA256e339dbe533c1a513a587f7530c821d2578a2fc9b8d1871bb958ee533267ceecf
SHA512d8fc3ec9568025fa7ca1b6c89255015c87e5dd16cca0da7ea3f8c68fadb88e4329c3e7a69adc35109d17b2c51406ce72d7f184fbdb66d302ca4a9e2f62360305