Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 17:18 UTC
Behavioral task
behavioral1
Sample
02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe
-
Size
2.1MB
-
MD5
02716d38a81377b2ff55202d5e92e6c2
-
SHA1
6a1e582b794285d86e6a7f85891db524f47927ca
-
SHA256
8c84e36b8fd041628c64743cbbf0a99e57eeb4eeb577be0765d4adf6e6613ff9
-
SHA512
b34fcdee73f307c80e5575f0a38b9bce6156621b838a2b37dd71b42836b6815ee290bfa3a1293e8047c034cf065c1f454e3df7999279d88891a8603afef7789a
-
SSDEEP
1536:OKD0A2T3vLbsih9e8bTTpb/IgQmP9zKcTDB4w/UjlQ/dpKRq:352T3siXei5bcmP9JfUjW
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0007000000023455-6.dat aspack_v212_v242 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SvcHosts32 = "C:\\Windows\\system32\\svchosts.exe" 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers32\Metal Gear Solid 2 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\QuickTime 6.x Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\WinRAR 3.11 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Return to Castle Wolfenstein Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\WinZip 9.x Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Rainbow Six 3 - Raven Shield No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Freedom - Soldiers of Liberty No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Quake III No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Paint Shop Pro 9.x Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\DOOM III No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Quake 3 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\WinRAR 3.12 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\ICUII 5.7 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Delta Force - Black Hawk Down No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Splinter Cell Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Soul Reaver III Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\MechWarrior 3 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Shrek II Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Unreal Tournament 2003 No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Civilization III - Conquest No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\MechWarrior 3 No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Microangelo 6.x Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Counter-Strike - Condition Zero Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Paint Shop Pro 8.x Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\CloneCD 4.x Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\MechWarrior 5 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Half-Life Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\FireStarter Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Metal Gear Solid 3 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\MechWarrior 4 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Microangelo 5.x Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\NetPumper 1.03 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Railroad Tycoon III No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Quake III No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\ZoneAlarm 3.8 Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\ZoneAlarm 3.8 Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Nero Burning ROM 6.x Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\FIFA Soccer 2003 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\ICUII 5.x.exe.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Train Simulator II No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Easy CD-DA Extractor 5.x Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Half-Life II No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Railroad Tycoon III No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Train Simulator 2 No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Internet Turbo 2003 5.x Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\MechWarrior III Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Chrome Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\SnagIt 6.2.2 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Black & White 2 No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Thief II No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\SWiSH 2.x Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Thief III No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\SimCity 4 Rush Hour Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Easy CD-DA Extractor 5.x Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\FlashGet 1.x Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Harry Potter - Quidditch World Cup Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Microangelo 6.x Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Macromedia Flash MX 6.x Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\Praetorians Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File created C:\Windows\SysWOW64\drivers32\WinZip 8.1 Serial Generator.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Sniper Elite - Berlin 1943 No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\SimCity IV No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\Midtown Madness 3 No-Cd Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\drivers32\RealOne Player 2.0 Crack.exe 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3480 2340 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe 91 PID 2340 wrote to memory of 3480 2340 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe 91 PID 2340 wrote to memory of 3480 2340 02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02716d38a81377b2ff55202d5e92e6c2_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\$$$$$.bat2⤵
- System Location Discovery: System Language Discovery
PID:3480
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request75.117.19.2.in-addr.arpaIN PTRResponse75.117.19.2.in-addr.arpaIN PTRa2-19-117-75deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request100.209.201.84.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request5.173.189.20.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
75.117.19.2.in-addr.arpa
-
73 B 133 B 1 1
DNS Request
100.209.201.84.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
5.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD502716d38a81377b2ff55202d5e92e6c2
SHA16a1e582b794285d86e6a7f85891db524f47927ca
SHA2568c84e36b8fd041628c64743cbbf0a99e57eeb4eeb577be0765d4adf6e6613ff9
SHA512b34fcdee73f307c80e5575f0a38b9bce6156621b838a2b37dd71b42836b6815ee290bfa3a1293e8047c034cf065c1f454e3df7999279d88891a8603afef7789a
-
Filesize
228B
MD5dace718cd218241879ad0d152fd9396a
SHA167c5721046d3643c5c068c487e5ab91bb1993248
SHA25605b4bd35867d10003764371b4d7f0645d9aa98989e24d6317233d22ae974a595
SHA5123bd90c5f0c093ddfbb9290a4d08ad96babe061fce3938ca6ee18313453bc37856fc00445db8e18349376c0f3eaee513089543b276e499894e281a5af4308d10a