Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 15:37
Static task
static1
Behavioral task
behavioral1
Sample
021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe
-
Size
520KB
-
MD5
021747066f9e052f90782827a2be2b5b
-
SHA1
78c23045de2babc50d435ae412950ea505e2e6fe
-
SHA256
db1263b169d2c287892cfb29e1e5d45452dd510cde2aef312aeb3766b01141fa
-
SHA512
0aa6249d52a58bddcaae81766337f2392904a8b3443dc91472834344fed078c82fd01fbb5eaf4f04830e54d884bf09842b8aceadf27a050cd2f2623e62035120
-
SSDEEP
12288:bFZzJQlN07E+XzREERZFMv0qIf0RK6BLPYt2IfNyRLvEFDLUJVd:57s07hXzR1XILlIfNyB11
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002341e-12.dat family_ardamax -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2996 XTHT.exe 2744 Undy Creator.exe -
Loads dropped DLL 10 IoCs
pid Process 4220 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe 2996 XTHT.exe 2996 XTHT.exe 2996 XTHT.exe 2744 Undy Creator.exe 2744 Undy Creator.exe 2744 Undy Creator.exe 4412 WerFault.exe 4412 WerFault.exe 4412 WerFault.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sys\XTHT.006 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\XTHT.007 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\XTHT.exe 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\AKV.exe 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Sys XTHT.exe File created C:\Windows\SysWOW64\Sys\XTHT.001 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\XTHT.004 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\XTHT.003 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sys\XTHT.chm 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4412 2744 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XTHT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Undy Creator.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2996 XTHT.exe Token: SeIncBasePriorityPrivilege 2996 XTHT.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2744 Undy Creator.exe 2996 XTHT.exe 2996 XTHT.exe 2744 Undy Creator.exe 2744 Undy Creator.exe 2996 XTHT.exe 2996 XTHT.exe 2996 XTHT.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4220 wrote to memory of 2996 4220 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe 82 PID 4220 wrote to memory of 2996 4220 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe 82 PID 4220 wrote to memory of 2996 4220 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe 82 PID 4220 wrote to memory of 2744 4220 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe 83 PID 4220 wrote to memory of 2744 4220 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe 83 PID 4220 wrote to memory of 2744 4220 021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\021747066f9e052f90782827a2be2b5b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\Sys\XTHT.exe"C:\Windows\system32\Sys\XTHT.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\Undy Creator.exe"C:\Users\Admin\AppData\Local\Temp\Undy Creator.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 22483⤵
- Loads dropped DLL
- Program crash
PID:4412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2744 -ip 27441⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5730e7e458c7770fd80947b6ce9f7109a
SHA1ef07be19ec55590ffce101951d12e7c6c5b7aaca
SHA25670033d7c8520fb53a247b355559c3a156e22719e52cf55102edbbcfabc5ad096
SHA51212f141144761e880af6567048036c7c482e6306158454f4c3a7821c1a5f5526771e3c473ddcc9cbe0860d4e61a5d5f092a59567222d0a995cdd1aeda5667a596
-
Filesize
28KB
MD5320f01c1429cd8f089ff432083f5e817
SHA1625c978a44282e5676da593d5c0374f875e94d58
SHA25634e116b6d704b6d69c8571455bd1a2b884d85b4ec5c70a872791c8dff8b97c3b
SHA5129009317cb56131ea4924123d30434a0b9632e1bdd2912b9e704330e08cd015309f18eaf85d98f2a90bfbe26d1c9bc64e8297b41368a2ec7e4dfe34ef136f07b7
-
Filesize
390KB
MD55255e3bd1037d42bbba2365412623a3b
SHA1b473061ee152172ba5e33cae18f55774467a070f
SHA2568e7e780b484bf5a5edce3dbdee2374ace11214b122560146b5859d8359c93655
SHA51286af1d593b480622dcb4835d5f10045452eb20a01a04eba13734fd5bfec2515321072747c8fd4c95714022058e891f7cd55efee00b95d7e51c845aaabf4a793e
-
Filesize
390B
MD533a92655a204eb6fb4f472830f2ca8a1
SHA12fba1e9ebf156c950d8b514d02b67e3152edeeec
SHA2564a967b9e6a14bcf4ae6d6d243df88081a0969eb15841dbacd5a9433a9ee7f8ca
SHA51270ba9a2ce056a6b42a50c4c138122562b97296b7445d05feab72ee02eaf4951a77ef8536a0614785b9d7f947a489e763dcde36a7f8d0d3425b8c74fe080da40e
-
Filesize
15KB
MD5b3d7c450a0e3cd5cb502360df3a246a7
SHA1ee1c25f1def0f12984ab3bc357ac92f3c7929f4c
SHA256d3adf6429f93dc93d2839a74cba69a45d10329d32a8ccb7517bd5c67cda034ed
SHA51213514bd7993b4d3de04f550a33f135483f6d3078408c0d5f098bf5a53ee56833f2f27c9f97f77412bb02cf490b89793c9244a3cf24d940452a1b8951a46576b2
-
Filesize
7KB
MD5385d77949ecf6cfdb4f3d15bf29dfbe4
SHA109bd106320e68a5a14aeb2a34e4f0a6a627c0d36
SHA25639659a7497354c9329be266683ae28be650b7639bca1def42af5d351e265762c
SHA512b9baea0afb78944080598fc11c5f6c76b3adde37838f4fe3c9371fb9508fea03b7ec6775e9fdc65f39a94103cb061970ea8c51ded113701eede00d4a2fda0db9
-
Filesize
5KB
MD5f50daad1c62b3af9daceddc982d3a28c
SHA18519625cc16fac60381ea27b3339e62cef15c629
SHA256246af3478a40b10bb54bbfb2aab8fb9965e702836f049dd9db714da8873b42d5
SHA5128451a35d6a037f0224f292baf151e1c367df394bdca0c7c4c90f43c6b275f1f8173af1bf1791005398ca36678b76df3e8e49f51438f9deec86a529a9c81925fc
-
Filesize
33KB
MD5620939d8d1c2ef290627806c1e22acb3
SHA143e7ddf293a7aa747312e04087f14b8dfac03e92
SHA25610f182b47bc95accf151a4668705df834b425c28f130b1a1de8cbd6370d1f933
SHA5121041f8835e537c79e0d6b50b509f66c3267de680e64bca68c485394e5e73322d697a59024963c1e4a06ce52df36eee7b9f5e4dc1ebaa37d98dd20accb44c5be7
-
Filesize
476KB
MD5b22ecd38fb2828478a5ff60e7a255e16
SHA1078d9e7d975a2769e8c2ad40279e265eff89b033
SHA256c2280b3b99486452228dd51dbd61db2afeb98d3cc5e8e48c5fb314c5af1a913a
SHA512336de2a0a9975a254dad2e87b3c5388e6fd5560fd5d47d0f4f882f216a4e23dc3d8cb894161587d6a1d0d8845fce92589afc41a6db7947de81ffd023764762cd