Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 01:19
Behavioral task
behavioral1
Sample
113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe
-
Size
37KB
-
MD5
113de567b602ba220e0b39a41cd6e822
-
SHA1
0c04c9114bce6ece5ff0d024d07428a7180d11e3
-
SHA256
704a0149a7ff05d10390fffe02a658c55b7820d5a8c81142e9d2565b71b91b4d
-
SHA512
555e854a707bac9d8352d047b333eb2cad1be8854fc3b57e80a335ac01ae21dc80f143d2b008e428881bffda6b4653a043da4655ad467f41f4c939e1c2fbe2fb
-
SSDEEP
768:vd2nri/EW9z07uyJt99Fc54hHm6Xl+gW7odjLyfR/dnbcuyD7U:vd0rUNv4FS4hG6VBWFdnouy8
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\3tulha = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vo0xz1.exe" 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts vo0xz1.exe -
Executes dropped EXE 2 IoCs
pid Process 4832 vo0xz1.exe 3208 vo0xz1.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ch623v2.log vo0xz1.exe -
resource yara_rule behavioral2/memory/3076-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/files/0x00070000000234b3-5.dat upx behavioral2/memory/3076-12-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3208-15-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4832-18-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3208-20-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3208-25-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4832-28-0x0000000000400000-0x000000000042B000-memory.dmp upx -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 264 sc.exe 5104 sc.exe 3876 sc.exe 944 sc.exe 1392 sc.exe 4424 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vo0xz1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vo0xz1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 4832 vo0xz1.exe 4832 vo0xz1.exe 4832 vo0xz1.exe 3208 vo0xz1.exe 3208 vo0xz1.exe 3208 vo0xz1.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3076 wrote to memory of 3336 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 84 PID 3076 wrote to memory of 3336 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 84 PID 3076 wrote to memory of 3336 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 84 PID 3076 wrote to memory of 1392 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 85 PID 3076 wrote to memory of 1392 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 85 PID 3076 wrote to memory of 1392 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 85 PID 3076 wrote to memory of 2548 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 86 PID 3076 wrote to memory of 2548 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 86 PID 3076 wrote to memory of 2548 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 86 PID 3076 wrote to memory of 4424 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 88 PID 3076 wrote to memory of 4424 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 88 PID 3076 wrote to memory of 4424 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 88 PID 3076 wrote to memory of 4832 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 90 PID 3076 wrote to memory of 4832 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 90 PID 3076 wrote to memory of 4832 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 90 PID 3076 wrote to memory of 2252 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 93 PID 3076 wrote to memory of 2252 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 93 PID 3076 wrote to memory of 2252 3076 113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe 93 PID 3336 wrote to memory of 4184 3336 net.exe 95 PID 3336 wrote to memory of 4184 3336 net.exe 95 PID 3336 wrote to memory of 4184 3336 net.exe 95 PID 2548 wrote to memory of 696 2548 net.exe 96 PID 2548 wrote to memory of 696 2548 net.exe 96 PID 2548 wrote to memory of 696 2548 net.exe 96 PID 4832 wrote to memory of 3136 4832 vo0xz1.exe 97 PID 4832 wrote to memory of 3136 4832 vo0xz1.exe 97 PID 4832 wrote to memory of 3136 4832 vo0xz1.exe 97 PID 4832 wrote to memory of 264 4832 vo0xz1.exe 98 PID 4832 wrote to memory of 264 4832 vo0xz1.exe 98 PID 4832 wrote to memory of 264 4832 vo0xz1.exe 98 PID 4832 wrote to memory of 5064 4832 vo0xz1.exe 99 PID 4832 wrote to memory of 5064 4832 vo0xz1.exe 99 PID 4832 wrote to memory of 5064 4832 vo0xz1.exe 99 PID 4832 wrote to memory of 5104 4832 vo0xz1.exe 100 PID 4832 wrote to memory of 5104 4832 vo0xz1.exe 100 PID 4832 wrote to memory of 5104 4832 vo0xz1.exe 100 PID 4832 wrote to memory of 3208 4832 vo0xz1.exe 101 PID 4832 wrote to memory of 3208 4832 vo0xz1.exe 101 PID 4832 wrote to memory of 3208 4832 vo0xz1.exe 101 PID 5064 wrote to memory of 1388 5064 net.exe 106 PID 5064 wrote to memory of 1388 5064 net.exe 106 PID 5064 wrote to memory of 1388 5064 net.exe 106 PID 3136 wrote to memory of 3828 3136 net.exe 107 PID 3136 wrote to memory of 3828 3136 net.exe 107 PID 3136 wrote to memory of 3828 3136 net.exe 107 PID 3208 wrote to memory of 4552 3208 vo0xz1.exe 108 PID 3208 wrote to memory of 4552 3208 vo0xz1.exe 108 PID 3208 wrote to memory of 4552 3208 vo0xz1.exe 108 PID 3208 wrote to memory of 944 3208 vo0xz1.exe 109 PID 3208 wrote to memory of 944 3208 vo0xz1.exe 109 PID 3208 wrote to memory of 944 3208 vo0xz1.exe 109 PID 3208 wrote to memory of 4468 3208 vo0xz1.exe 110 PID 3208 wrote to memory of 4468 3208 vo0xz1.exe 110 PID 3208 wrote to memory of 4468 3208 vo0xz1.exe 110 PID 3208 wrote to memory of 3876 3208 vo0xz1.exe 111 PID 3208 wrote to memory of 3876 3208 vo0xz1.exe 111 PID 3208 wrote to memory of 3876 3208 vo0xz1.exe 111 PID 4468 wrote to memory of 1448 4468 net.exe 116 PID 4468 wrote to memory of 1448 4468 net.exe 116 PID 4468 wrote to memory of 1448 4468 net.exe 116 PID 4552 wrote to memory of 5028 4552 net.exe 117 PID 4552 wrote to memory of 5028 4552 net.exe 117 PID 4552 wrote to memory of 5028 4552 net.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe"1⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
PID:4184
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- System Location Discovery: System Language Discovery
PID:696
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\vo0xz1.exeC:\Users\Admin\AppData\Local\Temp\vo0xz1.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:3828
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:264
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\vo0xz1.exeC:\Users\Admin\AppData\Local\Temp\vo0xz1.exe -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⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\net.exenet.exe stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
C:\Windows\SysWOW64\sc.exesc config wscsvc start= DISABLED4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:944
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"5⤵
- System Location Discovery: System Language Discovery
PID:1448
-
-
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= DISABLED4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3876
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\skyrlu2qp.bat2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218B
MD58403dc3b6b6b579277425ea932cd85e1
SHA12544934914b61b56a2a30dd879fbdeeb127c0f98
SHA256823c9292d3e3d560262b43da21b44e2eeea21d3e295b62954f9572338a9cc0c0
SHA51249e6ff322c63d86bd59a50664f408301a44c5cc11ca9e3b926d5d116c9b979b6f308c4098e2fa6ea73b21d1c41c856c90f0fa80382711b25cba298955a377206
-
Filesize
37KB
MD5113de567b602ba220e0b39a41cd6e822
SHA10c04c9114bce6ece5ff0d024d07428a7180d11e3
SHA256704a0149a7ff05d10390fffe02a658c55b7820d5a8c81142e9d2565b71b91b4d
SHA512555e854a707bac9d8352d047b333eb2cad1be8854fc3b57e80a335ac01ae21dc80f143d2b008e428881bffda6b4653a043da4655ad467f41f4c939e1c2fbe2fb