Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe
-
Size
349KB
-
MD5
0030527e0b31b3189694e0abaf8cf02e
-
SHA1
84db601a9dc06b0bae6eaec458c47c9a9d75a201
-
SHA256
56265aeedc2769451ba48059dad5fd79d647c6fc88fa7327ae1107f4845b7f38
-
SHA512
ffdc91e76cbc8b8ac55f5d4b30f9d69e440e289a3e77de8846e1b7d3c8a3025cad0b1af8c5a407dfdb9fd3ddd140e14f33c100669d6e42ccfc697802c9b67e14
-
SSDEEP
6144:g5O8UsE/eSJp7TzuZXaDnbMQ/2fgvqMBPD7o7h6jFNcc2eIP3OW:lJsE/rbTGXybMQ/IEwkF2r3OW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation setup.exe -
Executes dropped EXE 2 IoCs
pid Process 4704 setup.exe 1252 max2_133daohang4.exe -
Loads dropped DLL 3 IoCs
pid Process 4696 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 1252 max2_133daohang4.exe 1252 max2_133daohang4.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\sppert.ini setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language max2_133daohang4.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023479-14.dat nsis_installer_1 behavioral2/files/0x0007000000023479-14.dat nsis_installer_2 -
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\InfoTip = "Internet Explorer" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\Shell 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\Shell\Internet Explorer 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\ShellFolder\Attributes = "0" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979} 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\DefaultIcon 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\DefaultIcon\ = "C:\\Windows\\SysWow64\\SHELL32.DLL,220" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\ShellFolder 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\TypeLib 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\Shell\Internet Explorer\Command\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe http://www.7322.com" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\TypeLib\ = "{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\ = "Internet Explorer" 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E54AFBD-A6CF-44C3-AC87-ACAABE49E979}\Shell\Internet Explorer\Command 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4696 wrote to memory of 4704 4696 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 84 PID 4696 wrote to memory of 4704 4696 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 84 PID 4696 wrote to memory of 4704 4696 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 84 PID 4696 wrote to memory of 1252 4696 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 85 PID 4696 wrote to memory of 1252 4696 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 85 PID 4696 wrote to memory of 1252 4696 0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe 85 PID 4704 wrote to memory of 4948 4704 setup.exe 86 PID 4704 wrote to memory of 4948 4704 setup.exe 86 PID 4704 wrote to memory of 4948 4704 setup.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0030527e0b31b3189694e0abaf8cf02e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DelTemp.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4948
-
-
-
C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe"C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69B
MD532f45cd6abc1d26f07b8ddb71871ce05
SHA10cc28dc63d50327a74f8e964cdf23ffed05a8699
SHA256a2023fadce396c9265a61f24b6dcc5e95aaaf2b9efa1eceac2fcc1332322e716
SHA512f18d1ed212bda39f671fe7d7dac6cc6f5012e17149b57c7a121e666f09d5040c75ced09679bef1e630cd69fc03d824ced178be25b275139e4f4e139a0f96ebb9
-
Filesize
65KB
MD5b904cf041cacaae74655cf009acfed2e
SHA1028ef889562a55bc98119fe2c186efb35f556bd1
SHA25672f4498744d1c856eb35028fc0fa59bf0a78b0fa833c49ead54115f08c2f3846
SHA5124ebf41f49fdcb1b70c6b88351c85dff98eb2f75787e36b8741e922363ec8134399450351c431cefed42d1757163eb6196275d2c6509a9c4826bcc4961d726d4c
-
Filesize
21KB
MD533322da8b36ea8b67448ec34c827a319
SHA145cae4b64ecc9bb5d3f1e01faaa14e067e74828d
SHA256fcc886a8ef7575e292ef6210902581273e33047da2f3f6e0092b7887a212c2f0
SHA512e97a4b427e89832c6555ac64044b5b3745164482afd3ff7c4b17005c99f245cc7c7e97653abad345810caca3f472c43f51036157f32926ea81306c939e9e1c3c
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
531KB
MD5cc8dcfb3fd120dc74bb195e4634e86ee
SHA1cd5c6302235509b809d75a256d5b9f2a7f0ecf15
SHA256b538c0ab767fabf4d858ec3d2b3deac078f1d900bf42c0b3a0871a7d92b16dc6
SHA512b61f8a84acce83e1aa34b3b92d76cfb0b096685292c5594851678a03528c4bb3e6b9d404be0082c6b075275139725f8824932943a68b85eb1d0b38f8c30c2b65