Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 06:27 UTC
Behavioral task
behavioral1
Sample
1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe
-
Size
531KB
-
MD5
1686afa0e7dbcd96cb091bd4b4a4a519
-
SHA1
2133859a698b1f78bf9dead44d3f41571e9c0818
-
SHA256
a924b0bf1b61156ce5fb73d1a684197c6156330a4e0ebf6f178e0d50802515d2
-
SHA512
86e76818c77b2ff9c9a863dad3a872ee45a8bc8fd53d90722fd19228d0b07ee4dbc1ea43fc1bcbfa67a6563459ea1bca642157c655f993ae55134d1f03657719
-
SSDEEP
768:wAHAK5abPsgP7tS3wjdfPo+jIy0vk3F4DXm8BiyhWqxpD36N4vxoz86F3c1CT8FL:vabPZSIfPVIy0s1TQijqb3jozDF3Ca8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4964 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 4964 rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\t322027.ini 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe File created C:\Windows\SysWOW64\rpcss.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\rpcss.dll rundll32.exe File created C:\Windows\SysWOW64\t322027.dll rundll32.exe -
resource yara_rule behavioral2/memory/3824-0-0x0000000000400000-0x0000000000487000-memory.dmp upx behavioral2/memory/3824-3-0x0000000000400000-0x0000000000487000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3824 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 3824 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 4964 rundll32.exe 4964 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4964 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3824 wrote to memory of 472 3824 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 82 PID 3824 wrote to memory of 472 3824 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 82 PID 3824 wrote to memory of 472 3824 1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe 82 PID 472 wrote to memory of 4964 472 cmd.exe 84 PID 472 wrote to memory of 4964 472 cmd.exe 84 PID 472 wrote to memory of 4964 472 cmd.exe 84 PID 4964 wrote to memory of 3436 4964 rundll32.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\~e578240.~~~ Inse C:\Users\Admin\AppData\Local\Temp\1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\~e578240.~~~ Inse C:\Users\Admin\AppData\Local\Temp\1686afa0e7dbcd96cb091bd4b4a4a519_JaffaCakes118.exe4⤵
- Deletes itself
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4964
-
-
-
Network
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request68.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.205.248.87.in-addr.arpaIN PTRResponse0.205.248.87.in-addr.arpaIN PTRhttps-87-248-205-0lgwllnwnet
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.150.49.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request75.117.19.2.in-addr.arpaIN PTRResponse75.117.19.2.in-addr.arpaIN PTRa2-19-117-75deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
68.159.190.20.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.205.248.87.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.150.49.20.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
75.117.19.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
502KB
MD5bca08fbb14a8a4d4fb746edcc3a32428
SHA1d6f1c0dccb59a776be00d59bf49f0f6969881c86
SHA25629fd8e5e7947c9bf29e9ad61aa176fe98b7c8eb4d226539b027589f29c1f8d62
SHA512305522b472af35bde7707ca4e237b3df69c04e234a56c88036b0b303b63fad781de2c14d466f99af6bdc4f2e982eccaae74ab3ab46b82556fd66bc5d07390e7c