Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 19:06 UTC

General

  • Target

    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe

  • Size

    397KB

  • MD5

    102f0576f10ea89f06411e65e9ed81ed

  • SHA1

    4d038bdabc552d97ac31e537001cec45a4dd512c

  • SHA256

    8b6c56de17dd7332253fd809f69c409ab65d84b17776b3d03a6ea97e2dfe2aa1

  • SHA512

    4dac94dc389012b2e4521a643ca938818af6074fb06103a66920e095666721498f5508c9598e280a982564e474cb064e515356545ccaf405f6f22457f7187c83

  • SSDEEP

    12288:yZfAwROmO5q/o83wlJk2K4UmPaNgVxjvNZAb3m9zTqhnku6+CK+/NtSmSFhlwum/:yZfAwRekwly27UmPaNexjvNZAb3m9zTj

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\Users\Admin\AppData\Local\Temp\102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4304
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2964
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4760
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3892
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3196
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3060
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\getlucky.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\getlucky.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4236
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\getlucky.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\getlucky.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2584

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    149.220.183.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    149.220.183.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
  • flag-us
    DNS
    81.160.77.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    81.160.77.104.in-addr.arpa
    IN PTR
    Response
    81.160.77.104.in-addr.arpa
    IN PTR
    a104-77-160-81deploystaticakamaitechnologiescom
  • flag-us
    DNS
    67.31.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    67.31.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
  • flag-us
    DNS
    110.11.19.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    110.11.19.2.in-addr.arpa
    IN PTR
    Response
    110.11.19.2.in-addr.arpa
    IN PTR
    a2-19-11-110deploystaticakamaitechnologiescom
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
  • flag-us
    DNS
    210.108.222.173.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    210.108.222.173.in-addr.arpa
    IN PTR
    Response
    210.108.222.173.in-addr.arpa
    IN PTR
    a173-222-108-210deploystaticakamaitechnologiescom
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    43.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.229.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    43.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.229.111.52.in-addr.arpa
    IN PTR
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
  • flag-us
    DNS
    gavitt1.no-ip.info
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    gavitt1.no-ip.info
    IN A
    Response
No results found
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    149.220.183.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    149.220.183.52.in-addr.arpa

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    64 B
    124 B
    1
    1

    DNS Request

    gavitt1.no-ip.info

  • 8.8.8.8:53
    81.160.77.104.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    81.160.77.104.in-addr.arpa

  • 8.8.8.8:53
    67.31.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    67.31.126.40.in-addr.arpa

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    64 B
    124 B
    1
    1

    DNS Request

    gavitt1.no-ip.info

  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    64 B
    124 B
    1
    1

    DNS Request

    gavitt1.no-ip.info

  • 8.8.8.8:53
    110.11.19.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    110.11.19.2.in-addr.arpa

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    64 B
    124 B
    1
    1

    DNS Request

    gavitt1.no-ip.info

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    64 B
    124 B
    1
    1

    DNS Request

    gavitt1.no-ip.info

  • 8.8.8.8:53
    210.108.222.173.in-addr.arpa
    dns
    74 B
    141 B
    1
    1

    DNS Request

    210.108.222.173.in-addr.arpa

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    64 B
    124 B
    1
    1

    DNS Request

    gavitt1.no-ip.info

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    64 B
    124 B
    1
    1

    DNS Request

    gavitt1.no-ip.info

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    146 B
    144 B
    2
    1

    DNS Request

    240.221.184.93.in-addr.arpa

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    43.229.111.52.in-addr.arpa
    dns
    144 B
    158 B
    2
    1

    DNS Request

    43.229.111.52.in-addr.arpa

    DNS Request

    43.229.111.52.in-addr.arpa

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    64 B
    124 B
    1
    1

    DNS Request

    gavitt1.no-ip.info

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    128 B
    124 B
    2
    1

    DNS Request

    gavitt1.no-ip.info

    DNS Request

    gavitt1.no-ip.info

  • 8.8.8.8:53
    gavitt1.no-ip.info
    dns
    102f0576f10ea89f06411e65e9ed81ed_JaffaCakes118.exe
    64 B
    124 B
    1
    1

    DNS Request

    gavitt1.no-ip.info

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1480-2-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-4-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-10-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-11-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-13-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-14-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-15-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-17-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-18-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-19-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/1480-22-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.