Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe
-
Size
68KB
-
MD5
139e9a94234891656c1dbbebe1ee981b
-
SHA1
efaf819f9293480b9083a3a7a39ef74c2f73e3be
-
SHA256
cf1a099fd2e533b225e49d55c45b9276517acd22dd41a56edeb9f2742d298e38
-
SHA512
929fa0267dc49bfee8764f5f30a000cbd2373e715c9be88bdf0a0c6c8bd33658464f226126cc9565af881b4134d84d8d407005a03949239addfc6e497abda2a5
-
SSDEEP
1536:k9gswK6mz5xayrETcKa/KGrJWrQpI4OJq3BMVNf+XZWjxg:kPwpmnhrfxSFQeRJq3yVNf+pWdg
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL 2 IoCs
pid Process 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 85.12.43.103 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bolevudodi = "Rundll32.exe \"C:\\Windows\\system32\\bunuzope.dll\",s" 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a206463b-e85d-49ec-9234-75a098b4020a} 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Notification Packages = 73006300650063006c006900000043003a005c00570069006e0064006f00770073005c00730079007300740065006d00330032005c0066006900680075006b006100760069002e0064006c006c000000 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vegotepa.dll 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pibayebi.dll 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wafetaza 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\helubewe.dll 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\vazedize.dll 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\halomawo.dll 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fihukavi.dll 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\bunuzope.dll 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a206463b-e85d-49ec-9234-75a098b4020a} 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a206463b-e85d-49ec-9234-75a098b4020a}\InprocServer32 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a206463b-e85d-49ec-9234-75a098b4020a}\InprocServer32\ = "C:\\Windows\\SysWow64\\vegotepa.dll" 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{a206463b-e85d-49ec-9234-75a098b4020a}\InprocServer32\ThreadingModel = "Both" 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3404 1856 139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\139e9a94234891656c1dbbebe1ee981b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Authentication Package
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1AppInit DLLs
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD57334d97ee6a3fa8188917de783adbb59
SHA15efb8ca411e92142aa0ffea9a0ac7450be5c69b5
SHA2562261504d5b13b05e52ad9ffb4df782d1004bb1ae21916683841901daaa5422a3
SHA51244c27821fd336fe6731962dad76f686f7528f6fb1514a2fcfd3b604bcb3a3469d9aa54f1d24837e049cdd2aa008cf2236b8b8fb0ec5a10babe7d1f24cf3cd6e5
-
Filesize
1KB
MD54af7ff8164b38f0eb9bf89af1e43e76f
SHA19a50f8adf6cf4f3738fd8945426e69b5376dfec4
SHA2566824045982bfd6fb50d538efd5eeebc311b6c0ddf4c2d354233604a7b35e17d9
SHA512317c1cf98b91b18a54d0def342638683aa9d240e146488bd06f7395ffead6cb2f5edc5035a3aa274581e672c8253379b07d887c664eee57e80ae7c65219f90e3