Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe
-
Size
189KB
-
MD5
fdc0d4c58978e14ddc2d271efa4a6cf3
-
SHA1
bfd610bfe9b780132eca6f0e35db20dbad2cfb13
-
SHA256
9bf69d7e82b52d77284b7581b5c01f454f2148df6fa13e7cb1e738a3424cebec
-
SHA512
5702fa68df775a7fe08adf759a0a8025886dd94191d5e55cdc650733acc88675601ca072de8b14ce81efeb177c128657dbf1c8874f90506d3eb757c45941b209
-
SSDEEP
3072:cGGFOyZjhZt6ePQT0FN0cyVlIjBS/0n0tTg4U0B/QO6GpUbdBDnB2+JHg+MgITvR:rGvZtrYTeNFyVwS/0n0t0p0NpoBDBp1
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\clsid fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1} fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{b528aa95-96a3-cb84-cccd-f846b0a65967}\\n." fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe Token: SeDebugPrivilege 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe Token: SeDebugPrivilege 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3448 wrote to memory of 3536 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe 56 PID 3448 wrote to memory of 3536 3448 fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdc0d4c58978e14ddc2d271efa4a6cf3_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448
-