Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe
Resource
win7-20240903-en
Errors
General
-
Target
05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe
-
Size
154KB
-
MD5
05e1a2d1c8f499961d117b0151aa9b57
-
SHA1
efba452f343aef7d9f14e7643c63c5318845a66b
-
SHA256
f50de6cc6268c75f0273dc806eeca20389dc6ebfc0de5e821e408f27d2620f40
-
SHA512
94ff0a69c57a77a358bf06d98e824852946dba18715e5125b156860bc7c947206560b2ace60cbefcc79cb74d3411a5c49808902fe89efa932c12f392bcd0c4eb
-
SSDEEP
3072:WHUkV92apgkgawkuF9I1doR9AQf1b7BnXoRnGZej2KHRH+lVMYqdl8Sx:Wt72MVganII1doHv1FXoYZ/SHUwdN
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\nsinet.exe 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nsinet.exe 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4228-2-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/4228-4-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/4228-5-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/4228-6-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/4228-13-0x0000000010000000-0x000000001004C000-memory.dmp upx behavioral2/memory/4228-62-0x0000000010000000-0x000000001004C000-memory.dmp upx -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Instant Access\Multi\20080227030259\medias\button1.gif 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\Multi\20080227030259\js\js_api_dialer.php 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\Multi\20080227030259\dialerexe.ini 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\Multi\20080227030259\instant access.exe 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\DesktopIcons\SuperBabes.lnk 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Instant Access\Center\SuperBabes.lnk 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\Multi\20080227030259\Common\module.php 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\Multi\20080227030259\medias\button4.gif 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\Multi\20080227030259\medias\button2.gif 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\Multi\20080227030259\medias\button3.gif 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\Multi\20080227030259\medias\dialer.ico 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Program Files (x86)\Instant Access\Center\SuperBabes.lnk 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\dialexe.zl 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Windows\dialexe.epk 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe File created C:\Windows\dialerexe.ini 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF1C8E21-4045-4D67-B528-335F1A4F0DE9}\LocalServer32 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF1C8E21-4045-4D67-B528-335F1A4F0DE9}\LocalServer32\ = "C:\\Windows\\SysWow64\\nsinet.exe /run" 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF1C8E21-4045-4D67-B528-335F1A4F0DE9} 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4228 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe 4228 05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05e1a2d1c8f499961d117b0151aa9b57_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD578f13904dfc6ffbef5b797ff1a5c0cbe
SHA16487c315f19adaec87b040769e6db326983073a8
SHA256c0c4f298f860438e2a6a23a781110ee8616766144ba5eda15eaabe470e3ad1fb
SHA5129e0e0857fdd88f55b0b5e9de59aff7a91b73e0934d7a4bd50a2e8dbc6c6da9060db62afdbb1f4c0596aa8581bf9ed2855def3bea26fdbeeae979fe3a31d99c3c
-
Filesize
154KB
MD505e1a2d1c8f499961d117b0151aa9b57
SHA1efba452f343aef7d9f14e7643c63c5318845a66b
SHA256f50de6cc6268c75f0273dc806eeca20389dc6ebfc0de5e821e408f27d2620f40
SHA51294ff0a69c57a77a358bf06d98e824852946dba18715e5125b156860bc7c947206560b2ace60cbefcc79cb74d3411a5c49808902fe89efa932c12f392bcd0c4eb
-
Filesize
741B
MD5540a40a0bd9e3e80b4f1663ab5163317
SHA1906d63e88a356f05f1f8d01d32582985b9234ef0
SHA256ffa5c2e09a84276a263eaa56809c1b2a111478576c9917cf46dd9e6a3335cc87
SHA512cff641061c1b648f83972c29874fe66a3ac9a89ba0686bc26bb5d51cb9879bd0575aa9ef4ee944954ed10d01581c66efc885ff2e4184f6ee541d79eaabcff142