Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 01:19
Behavioral task
behavioral1
Sample
37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe
-
Size
16KB
-
MD5
37c28dd5c1e185c5cded257ad6c91c03
-
SHA1
3f84157f5bbfeebd135220130a8b0bd616017545
-
SHA256
1e2813f4a23f085eb4812095a26d592902cda2582e190e162c3f7dc3825c5c1b
-
SHA512
f7cab8fc08ff970577b6a1b79743fbedb53eb4318394f6e0c54efc575c709d55b74d33c3bf7e0b7ad5c1b625a384538ee1434caf460eb158e5352efc08ed3b41
-
SSDEEP
384:5wP9YbWZbqSmvklj4kHwxVNECwodNyPVuXzFsY:2VYK4BvkljwxoC5h
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\mtkle = "{139EDF6B-E790-466F-0A89-582C56D48C1F}" 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\ndisrd.sys 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 3432 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\zcsav32.dll 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3432-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3432-7-0x0000000000400000-0x000000000040B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{139EDF6B-E790-466F-0A89-582C56D48C1F} 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{139EDF6B-E790-466F-0A89-582C56D48C1F}\ 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{139EDF6B-E790-466F-0A89-582C56D48C1F}\InprocServer32 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{139EDF6B-E790-466F-0A89-582C56D48C1F}\InprocServer32\ = "C:\\Windows\\SysWow64\\zcsav32.dll" 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{139EDF6B-E790-466F-0A89-582C56D48C1F}\InprocServer32\ThreadingModel = "Apartment" 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3432 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe 3432 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3432 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 3432 wrote to memory of 3540 3432 37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37c28dd5c1e185c5cded257ad6c91c03_JaffaCakes118.exe"2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD58bf32bb81490a0c0428ff8b6f59ee042
SHA1959550372bfb3e254057c750bf858df375e8848e
SHA256f48fedceac21e1b76871f30d84786d2bc3c6de854d0d58ea3f6a53f6f16a03db
SHA5129caeefa2a2d275983b29a8fc454e3fa140b0217533d9102f722381bbf3d6a76db708de7d4da3c6ec1687c9896752e8c5137276ee2db0b0eaa903bb9dde8b6b48