Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 06:24

General

  • Target

    04ada03e237651e65a29cc53c60fc3fd_JaffaCakes118.exe

  • Size

    675KB

  • MD5

    04ada03e237651e65a29cc53c60fc3fd

  • SHA1

    70adacc3769cc2d4bc1df9a4070bedfb0cd57b4e

  • SHA256

    65f53dd927a20a1551a4e2b5d7d9aab0df8146dde78e0abd2f22cbdbcd66feaf

  • SHA512

    a5b3902963e6675e8426c2d4791a878449d958570773681120c7d8d8a1f07126eccba9d7f82c4f5e9980f11bcf621158aaf8b4acee8524f9398781bb7b52513b

  • SSDEEP

    12288:zd3XQuje75cWCDj/iUVFWZ+eHUwRPUCWesLYJzfkjgmiiXVg6b:z9S75YnZFWZ+e0wRsCWLYFfkjg3iXJb

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04ada03e237651e65a29cc53c60fc3fd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04ada03e237651e65a29cc53c60fc3fd_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Users\Admin\AppData\Local\Temp\MFC private spy viewer.exe
      "C:\Users\Admin\AppData\Local\Temp\MFC private spy viewer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sivkdft9.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESACF9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD5926E1952FB4277813CF25E673C5EA.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3152
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xyifdwbo.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:692
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2B1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3B45A3D6899947D89B91F1A952ABCD1.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2340
      • C:\Users\Admin\AppData\Local\Temp\clr.exe
        "C:\Users\Admin\AppData\Local\Temp\clr.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3492
    • C:\Users\Admin\AppData\Local\Temp\server 4.1.exe
      "C:\Users\Admin\AppData\Local\Temp\server 4.1.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\clr.bat""
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3780
        • C:\Users\Admin\AppData\Local\Temp\clr.exe
          C:\Users\Admin\AppData\Local\Temp\clr.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\clr.exe.log

    Filesize

    496B

    MD5

    cb76b18ebed3a9f05a14aed43d35fba6

    SHA1

    836a4b4e351846fca08b84149cb734cb59b8c0d6

    SHA256

    8d0edecf54cbbdf7981c8e41a3ed8621503188a87415f9af0fb8d890b138c349

    SHA512

    7631141e4a6dda29452ada666326837372cd3d045f773006f63d9eff15d9432ed00029d9108a72c1a3b858377600a2aab2c9ec03764285c8801b6019babcf21c

  • C:\Users\Admin\AppData\Local\Temp\MFC private spy viewer.exe

    Filesize

    253KB

    MD5

    3b9d47f585cf623ce70af8e28a3cab24

    SHA1

    764e9a77163fde2c2b9e98569a2dc87a498acb94

    SHA256

    e96f48a446f49de7ee51cc5a3d8a4d9c9faf484007a77f95c0f67276735248e6

    SHA512

    77f797732ccf861292e95be2217772cb08e760ea9bc90d1259acdad23192d4bed8e06b0572b00d2147a5b35d8697f5c991011494400ec93eddec88549804cdaf

  • C:\Users\Admin\AppData\Local\Temp\RESACF9.tmp

    Filesize

    1KB

    MD5

    f7c3e233d0f82498efc88b22fc8c9382

    SHA1

    227bb2ce81b7a93833f9637d31a24945a9b63c28

    SHA256

    a399450b0f64a664b89b286904f19d52f8162752d5795a32dba77d097a5d36ac

    SHA512

    a902be9a8167192b6e42040c4f658c1151a53ff1e580f78c2f771adfde04f4bac94eb8406854b7dc8bae07dca105440a5dc4f5de0beb6bf0ee6022ce793b2efd

  • C:\Users\Admin\AppData\Local\Temp\RESD2B1.tmp

    Filesize

    1KB

    MD5

    221029cc3c6341c3acb72a501d268289

    SHA1

    10b4c65ff9af72c8dbfc11036234c61f4b3256a4

    SHA256

    22715cb5256537e7cfb4bec5975d7e99599367934ea2761b6f0812b047b3d092

    SHA512

    70cb855729383176071181c638c43946a7334b1a4e40dc4c53550caf8ef4e18bc41960aeffd450e95277f2abe11035d02f7a5f5cab1df315f3b7df8a5d0737e7

  • C:\Users\Admin\AppData\Local\Temp\clr.bat

    Filesize

    47B

    MD5

    e5124dc041d3f0cbb09bf59d2ccd7cd1

    SHA1

    bdcf4747b130962d13e45f19c2e0eb14c40df801

    SHA256

    61590247f8ae3bc019e7abd6b2b676f581a46a7a8c45b077da6f2cc4456fc8bf

    SHA512

    c7312828d494ed5f05e3a77ade160cfe44574d94cf5d9da68c6f54bd90d59af8b378ac8f60d01770666faeedbf596c3cebb5aadf50fb262a2cb718046980ea4a

  • C:\Users\Admin\AppData\Local\Temp\clr.exe

    Filesize

    8KB

    MD5

    1674ef2e899d2c646370dba907bead8f

    SHA1

    c7300b3af54d3c74f914a0940bbdb6932bbf17f5

    SHA256

    1cca8c74a6c0f863e7a60d6c922ea3b00730bb9c2eec0da28f8ff0dd6ab6c87c

    SHA512

    f5dcebeb34bc2a5b8091d4bb17bff2193602cf2f24ec1d998199347fa024184a6bb5eb3b6262821bd96c6d4055e6f5aeabfc8c0637e2fc724c2c19cb030901c9

  • C:\Users\Admin\AppData\Local\Temp\clr.exe

    Filesize

    18KB

    MD5

    edb33dbcb66ca5b1b683a5794dc3dc69

    SHA1

    265edce3adca09ce9a07cde288bd872abb602ff6

    SHA256

    31a2e213a9d59a5e892cfbc83af85ba2798588b094d995f06bee1fc8efc9fe46

    SHA512

    d8eb9accd4131c736f959c2a7999c4a7ebaaf6ad61ad6064352895c167492d6acd8a467b4aea9a2349948a4e911fee264e593427710302a34f3ea2b531d4039d

  • C:\Users\Admin\AppData\Local\Temp\server 4.1.exe

    Filesize

    129KB

    MD5

    209ee0a3a4ade0703ae26894ae8ef114

    SHA1

    d48713d97a7fd5aa0c930152e8551c656550c4f5

    SHA256

    85035f51eca093f524fbc1eabebbe6d4e33a2e734071d311e6136aa3b9e4a51c

    SHA512

    f4342a20df5e846ff6e7963ab6b6e7b0a21c57f704aeaaa4c1983c4a1245184c9522ed09e96f117ff1be7c4d69cd0a7488c8263e5ba3aea06dd67daf32522868

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.0.vb

    Filesize

    857B

    MD5

    fdbc78c689d676f3896eb4de1a193a08

    SHA1

    7b3c42a2d7ecf1c341b7c6fc5a1717072a3d27d1

    SHA256

    faad35724da26e03d827551bfb804c1f79e26bd0ddef9eca183d4749ea5e6236

    SHA512

    744eba2362dd82a19f03deb4dc114df2ddbb07002a483216ccb26ff8a1b10d2fdc814fccdd1265b68ec4519f1b1304807430143d988662b6c1e67ada2826a8b9

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.1.vb

    Filesize

    25KB

    MD5

    28d06195b28bf7d7e9499f510d59316d

    SHA1

    044341807d117580a56bd2a79b2607c00463d7fd

    SHA256

    78da77bf4582b066576078a69f9e66dc963690a1cfc922024e7618a3c4cb38cf

    SHA512

    af04e34d5aedb3f39c2a40f3a4ffed597b67309a5ef1cc56eab1459ffc096ea0b49123fadd36ea281bd13cf822d4249342eb5aab612e2d97b34a1311cf81cae4

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.2.vb

    Filesize

    795B

    MD5

    1185faab23166a5b09f5f14a71861316

    SHA1

    771c50f22b1da2ba9c4742b0e8ec5270f291a8ed

    SHA256

    2496bf0bf3682d7506017147e44f3bcdab96c2db62499268dff231d8a6c67b32

    SHA512

    2c006ce92a1723ad65686040824d03a4835f5acfe7c30018149d27588f805896458d11f40b424eb6559b5c0a050ff7fdab3be6f0d9af5995c5476bca64c0fbb4

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.3.vb

    Filesize

    35KB

    MD5

    98134d6f49f07b6a9f1292afc0e0c19e

    SHA1

    0a634c34e616b3600a5f8214a2eb8fdc15ef2453

    SHA256

    fd4fb89e5da51449b31fcfec4997213fb4430dfebd0a5061b1e631258d01efc1

    SHA512

    712f530e1275b1a683d0ccc233de52d08679561351f729f7ed3a0c1f0992d65581cd3e8cb6e515858fc3ea123ff74dc1422f2105da104004fa39425663e1ce70

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.4.vb

    Filesize

    14KB

    MD5

    3faae419e471168068e36f40285933cb

    SHA1

    74918e00032eed53f26a08c4a145f5e142193891

    SHA256

    9978c8cd04395cb4377572d9d2fce8af0c3348014e2ae86d985cfb619b9ad2ff

    SHA512

    e9fc7b830ae354c78f2a7984b0af599ae026e2662ac64f84946f87af8b4f75755577ef78db296a9383c98decaf204c0311f72cf43e9b67b193504b7f6c47b869

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.5.vb

    Filesize

    1KB

    MD5

    0758cdcce81e800db2cff09d87638f0f

    SHA1

    6adb687c5cb376bfde3b5c87cd21c837ea60efaf

    SHA256

    03d85bd092afee246cd6d470edb8c7dcbc7be8340e26184f47ebd2605b76f832

    SHA512

    55a889cdb82e062dcfd60dc7df09f5c5210486a9b08ec5b9735ebf819735b00f660193682459cd28a3d8f252397eb134fda3b3ccb10d4d1b12f32daa9be12bc9

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.6.vb

    Filesize

    197KB

    MD5

    bb50a07a3f1f123cd7812b2e4eb0b9fe

    SHA1

    badf795c5644d8218245bab8f5016e8a7345d3fc

    SHA256

    d90ef40b992161218698faed9a7163a682f66a82656f8394ad00c7613b5b1096

    SHA512

    0cc46e79c04cad3f94e46cf40ca38f94c151fc87481c7949b4d4790c6aa5d363e0bb4e17c007644f350e7229403ffbd6b6a3ca7921f8f2359dc80e311ec2894c

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.7.vb

    Filesize

    29KB

    MD5

    e6b74346c37588ad4a087902b173d6c7

    SHA1

    8e4650c0b8bf4a9e6067e30f4ca44888630fe7c3

    SHA256

    57698dae3a4bf25e5bb9ae4a89d948658a920746a67a5ced375d2e3caeb76f68

    SHA512

    9d84304fe9dc787949a5f845152d3d62f0e06c945c93b6c9949c9382cf931392e1aed62a694dd069e9f352bddec2580d805f9dc04ff67c2425474c188b3e9555

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.8.vb

    Filesize

    10KB

    MD5

    1951ac9916b7c01d70ec0db2284c2263

    SHA1

    143ed52e9ff219c03835a141b806043fec9f59fb

    SHA256

    6119d2f007eb73e2dbc0bffec259e57f707efba0f1910350a9ebcc0d700108b8

    SHA512

    8726de3c5a76dd3b524b262f4d4d85d725cdd138b7186e441947f65689a661f39379e83e6a95fe7fd85535783cc25b8a7c1dbd761054cec852a9aed8547ad6f8

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.9.vb

    Filesize

    924B

    MD5

    2bcc4501b85d4b03da80d492121e5c65

    SHA1

    ab0c3672934310ca9b87afae56631da451151d3f

    SHA256

    856e799b9e7b38641c7f99969bc8148cdb1d90054e6020b1b385d2f5396221ac

    SHA512

    911e49cd24e3a09e1413cdfce342475f8c99ccd30f579dfedd918039d2b6796ef3bcaedce88730e1881a604457da028c5b4e1d101ea8b3c03fdfb89a8fb02a24

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.cmdline

    Filesize

    1KB

    MD5

    f86464a490d19ff7d677ef86fc5f5748

    SHA1

    58d42017efa117d1d35e341e75c28514df3d942f

    SHA256

    c2281f182b071b98b849a3ae95b7b758339950eed4373e13c3c818c12fe34d5b

    SHA512

    c0dd39d77b792eb42dba1122c86a4514aba2746c18915dca82cdf67ec97c865c161e08823c10f7692a6ba37a982df900f185e3fd9d45723c3917f818355a653a

  • C:\Users\Admin\AppData\Local\Temp\sivkdft9.exe

    Filesize

    133KB

    MD5

    a89aa32179864c3c28cf69b067ded924

    SHA1

    361f9b9a69c9b059399893724b1751f2a193a655

    SHA256

    a88f1ca45c5af7260f5088db2e8270c45982510c0d152671a4d91ecdf947d7d2

    SHA512

    21e90075ab8b8ee43ca447f12fc9616346c140aa7458565be195b096e446e02ec21ca13dc1939a15d64931580fdf2997fbac6c1b9fec3730a7bffe271f95a514

  • C:\Users\Admin\AppData\Local\Temp\vbc3B45A3D6899947D89B91F1A952ABCD1.TMP

    Filesize

    628B

    MD5

    aab797e406bc521b53bf4fecfdead88d

    SHA1

    be42d791f6df718aa5f5f2782340aafe74475fcf

    SHA256

    cc7ed6acb3fe1c532c817210f189c09f8d9fba4a668672b9c6a80b725831b7bb

    SHA512

    d0028eeb8ff6c3290f18915570f463aa14e9463004fea256748d628b1a154ab4120e3b76fb88fd5345b5888b7983d6fe32a4a8f2537c88daf53af91ec6b4dfa8

  • C:\Users\Admin\AppData\Local\Temp\vbcD5926E1952FB4277813CF25E673C5EA.TMP

    Filesize

    652B

    MD5

    a993d2c7d6aa8714e4fa02b7967d8479

    SHA1

    eece825aa3841c94bb24366f04a46859bc237eab

    SHA256

    26d15189785a42519415d739f2e28364cc9f58fa0a7745c41ae87b30d299625d

    SHA512

    47ace3aad6f94dd71e4671ae116b2dac9afb104908b6dba23bbc6d660f970618090b4190afafd2ad359fbf71e99913e491555e746c53e8d216e2b656b16183af

  • C:\Users\Admin\AppData\Local\Temp\xyifdwbo.0.vb

    Filesize

    2KB

    MD5

    78b545a7a0fff1ce128eb164afad3136

    SHA1

    08923662df224e317bab3c50cf628102856c3a3b

    SHA256

    6a6b5d1cf2ab2af86a58268c00d3db1ccea9f658b99b5b99502f046e6aa4021c

    SHA512

    b7b0b3e57cd003bea05787635b6bed1ce8e50c7eb5d2af4ce4bf156ecbc4e73e486a08131d1e7b0f8e70f7b875e3b9a6d546b80eba73f7ce4ae6809562eda7c5

  • C:\Users\Admin\AppData\Local\Temp\xyifdwbo.1.vb

    Filesize

    117B

    MD5

    2afb154162a3cea7547513c856e7c7b4

    SHA1

    672bd1dcd13c9a9138afd4043a592ec6526ab6bf

    SHA256

    07c743a2e2d7424729bb19bb3dfb14497c3627ee344dfe21d5b524ab44d25c4b

    SHA512

    80fa302d2a9e3b06972870a4243c3bd822aa4d4cdde6a6d1950f325aa8f00ee1e00a8cb0d280cba50a99807df6431cec8164ec57bfa913a4f61f92306dee189b

  • C:\Users\Admin\AppData\Local\Temp\xyifdwbo.cmdline

    Filesize

    561B

    MD5

    03361e016c70c97bc7a187d510de75f1

    SHA1

    7ebf9620ee60ce765f26e7d51c44d3a87c85c33a

    SHA256

    7e353c9f2b639a26a9851210a23c39c7c2268b33118e74fa13188aba2887dd9e

    SHA512

    1b02f8a9ba21e097aa3dea6a9d7b6af803bc008e03b93df2698e4f5729c487525d585c3fef0a56903a96d746153c79924ef53cfa4865ac260af164ddfda14cd3

  • memory/2916-17-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/2916-16-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/2916-15-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/2916-67-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/2916-87-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/2916-46-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/4248-68-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/4248-29-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/4248-28-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/4848-33-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/4848-30-0x0000000074CA2000-0x0000000074CA3000-memory.dmp

    Filesize

    4KB

  • memory/4848-0-0x0000000074CA2000-0x0000000074CA3000-memory.dmp

    Filesize

    4KB

  • memory/4848-31-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/4848-2-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB

  • memory/4848-1-0x0000000074CA0000-0x0000000075251000-memory.dmp

    Filesize

    5.7MB