Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
41ed32f676e434688450e1e8c62ce750
-
SHA1
a3210524c563e4d4c7ab64cb46ec6b4962b6be2a
-
SHA256
3e32f3f41e96b712005cba5375dd1d4b73700c40a2820ad014cfdeeb2c4da8e3
-
SHA512
bc91c6bc4939b577de5242d9978913749178ce1f8b5e808cc772d9d5243223b11188fe572d1dc725b962f165f338bb064a5f5f34a3df59e6810d6058c2ecd8ab
-
SSDEEP
49152:5ZwH0ScADC8NF8nEnsxzexRYUbkOguYwz3+d+hw/AFP:5ZwUSciPNF7nLYbOgiQ0w/eP
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 4200 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation newins.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 4konya.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 6 IoCs
pid Process 964 PekloCheat.exe 1316 runme.exe 4380 4konya.exe 4584 newins.exe 3668 mac.exe 3232 hqortka.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\PekloCheat\runme.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Fe\Oa\kk099999999999kk.qrw 4konya.exe File created C:\PROGRA~3\Mozilla\hqortka.exe runme.exe File created C:\Program Files (x86)\PekloCheat\newins.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Fe\Oa\b222222.vbs 4konya.exe File opened for modification C:\Program Files (x86)\Fe\Oa\ooooooooopopopopopopopopopppopopo.bat 4konya.exe File created C:\PROGRA~3\Mozilla\osxrmrb.dll hqortka.exe File created C:\Program Files (x86)\PekloCheat\4konya.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\PekloCheat\4konya.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Fe\Oa\a0000000.vbs 4konya.exe File created C:\Program Files (x86)\PekloCheat\PekloCheat.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\PekloCheat\PekloCheat.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\PekloCheat\runme.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Fe\Oa\cizfffffffffff.az 4konya.exe File opened for modification C:\Program Files (x86)\PekloCheat 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File created C:\Program Files (x86)\PekloCheat\__tmp_rar_sfx_access_check_240630000 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\PekloCheat\newins.exe 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PekloCheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language runme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4konya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newins.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqortka.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3668 mac.exe Token: SeBackupPrivilege 4444 dw20.exe Token: SeBackupPrivilege 4444 dw20.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4380 4konya.exe 3460 cmd.exe 964 PekloCheat.exe 964 PekloCheat.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3456 wrote to memory of 964 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 86 PID 3456 wrote to memory of 964 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 86 PID 3456 wrote to memory of 964 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 86 PID 3456 wrote to memory of 1316 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 88 PID 3456 wrote to memory of 1316 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 88 PID 3456 wrote to memory of 1316 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 88 PID 3456 wrote to memory of 4380 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 89 PID 3456 wrote to memory of 4380 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 89 PID 3456 wrote to memory of 4380 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 89 PID 3456 wrote to memory of 4584 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 90 PID 3456 wrote to memory of 4584 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 90 PID 3456 wrote to memory of 4584 3456 41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe 90 PID 4584 wrote to memory of 3668 4584 newins.exe 91 PID 4584 wrote to memory of 3668 4584 newins.exe 91 PID 4380 wrote to memory of 3460 4380 4konya.exe 92 PID 4380 wrote to memory of 3460 4380 4konya.exe 92 PID 4380 wrote to memory of 3460 4380 4konya.exe 92 PID 3460 wrote to memory of 3244 3460 cmd.exe 95 PID 3460 wrote to memory of 3244 3460 cmd.exe 95 PID 3460 wrote to memory of 3244 3460 cmd.exe 95 PID 3460 wrote to memory of 4200 3460 cmd.exe 96 PID 3460 wrote to memory of 4200 3460 cmd.exe 96 PID 3460 wrote to memory of 4200 3460 cmd.exe 96 PID 3668 wrote to memory of 4444 3668 mac.exe 97 PID 3668 wrote to memory of 4444 3668 mac.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41ed32f676e434688450e1e8c62ce750_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Program Files (x86)\PekloCheat\PekloCheat.exe"C:\Program Files (x86)\PekloCheat\PekloCheat.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:964
-
-
C:\Program Files (x86)\PekloCheat\runme.exe"C:\Program Files (x86)\PekloCheat\runme.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1316
-
-
C:\Program Files (x86)\PekloCheat\4konya.exe"C:\Program Files (x86)\PekloCheat\4konya.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Fe\Oa\ooooooooopopopopopopopopopppopopo.bat" "3⤵
- Drops file in Drivers directory
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Fe\Oa\a0000000.vbs"4⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:3244
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Fe\Oa\b222222.vbs"4⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:4200
-
-
-
-
C:\Program Files (x86)\PekloCheat\newins.exe"C:\Program Files (x86)\PekloCheat\newins.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\mac.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\mac.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 14724⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
-
-
C:\PROGRA~3\Mozilla\hqortka.exeC:\PROGRA~3\Mozilla\hqortka.exe -tayspuk1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD558eeef7fad223983c70b5d0c91aba472
SHA1b42ca4c0b460f92d70bd0f3833b225a107a52cfe
SHA2566d80a4d9927fae66e838dc195c857630a81ffc970cab587778e1dea21cff49db
SHA512e85edb73a639fe947904960956a28d701dee62d1c434ffb11b1d55254705eaf335524c4240bd7dfd22d455acdee68d6600d03f95298ee466148faf58aa680432
-
Filesize
161B
MD555106fe0a0c4bd1efdf0262512175d87
SHA1983dac43a06ad9bc9c487a40717fbc6b5f1b4a23
SHA2562783fd1e87d7378c897919a6e08b5ca9263f3529428f78e0743953dd0b5cebee
SHA5120c17de06c74a95a20d4669e963fb2998177f969f037968c13f6afc72350f2d8672e00d9803f1d07961b65fa1dd309b9694bc97fcc95cc2580f1e394c9c50770d
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
65B
MD53e08a7aa432b615b5d0a8d01704b20c1
SHA1db1f8fa524f7b078404466d3175f371c39aabb83
SHA256e6ff55027225808db193cc6367122b7285f101150bd49333cb872e3266d46cd9
SHA5120048d76339bf007e53c04c71aa0982ab09082c51fd8533ca652610bb54481e123dea4fb80653585d5285651ed85b4093308bed50b68cbfe75afd32714d670785
-
Filesize
1KB
MD5c6c8bab32115a3989f153b691ced733d
SHA1645412f15b3e36fd5eb184e27bf39c15599748d5
SHA256c1b73590afb430e3f4df5ff2a219a3d563a22cd181ced8daa21ac6f874c9a1e1
SHA512b84e61c820f19fbfa7aaffccae0b62d08b3106acc3bcd9e902e8ac9c08da44435a4b160c9c53bb9035322920d356e8c10b397c9901ed1dca85882f4f0a70c1ed
-
Filesize
128KB
MD57b69e435c062c5fad1b9d15e6fcf905e
SHA13cd33e4cda1eec87758c7a4e59f61b92a00e0dcc
SHA256f6de28551cfe268583d7f9d34b35c41af9fdc46026f66d6a542900e67724ca8b
SHA512dcc7e33cf990e21a8a8b3bc3e3598e5604f4ad58f2de437459b0acaca296b27be9f438e76024607c65db0cc6ebf198d58dfb2dada72b3b8bbc62ee68bd89cf72
-
Filesize
1.4MB
MD5bd8747967e7fb5f7e80c1be71f4c796f
SHA17f71cf7a89f8f5f576898bef94714de1d3c57c92
SHA2561168437d522bbd8102351cf91c09e92c8ddc92a5c4e0a3a2a6c9a1ee5861fcbd
SHA512a03076d8e3f99ba156b8922182d95da8d712a5f9dcf1c1f517eadb2172f2103c10a3e9b1b6a14dcd8677cb759c9c97119e0cf720e6f20055b9ac9cf6d1226da4
-
Filesize
123KB
MD54496eb67c762bfbbd26b9b5fe9eb1c67
SHA1d59a0935137d04831cd19652e4899b912df0e6ce
SHA256f5de87c232daa8e5b17393841b758ab576916df80b0e395a845ad3d3f4b58580
SHA51291fb42b40dd4b65b14133b7a2bbab66cd0e5aa85ee118841fc57d92d163a0fd80319ae203a1cab12314c7c18aa48ddf67baae2e68242a44a47b69c667cb79676
-
Filesize
176KB
MD5f6d2eefd8d5eadb52ec0cd3c3526b7b5
SHA1299f02ea5aff2231f92b024ec830b6c1af286977
SHA256a2ed71f40e20980940eb47d0f1a5fffde0627934536de52104d1caf956912c7c
SHA5120c0d22f8c85192d686841915d1b306f9e4243acf40b0ee2053c86d84970cc96cf75f5c54b1b8df5105a69024b1b416cc6abcd00dfa0673606fcf5f99269abba6
-
Filesize
176KB
MD56032547e35e852e4c76538cc7cf0b16d
SHA12411a2e9e6f8769030602cc3d9d66fb44862ed75
SHA256d815642b0b3f4c052e52cee8fd5024d1a8b0f106730bd94f4f8e98b5e6ccedf0
SHA512f6ef7174c5736b735485bf10606a770f30961f1356486b5131be3cac3d30a0a1e76707e902d8e01cc6e1d4c9c929365406d5b637c357af82c62b6566cd1d0845
-
Filesize
48KB
MD58ca21ef0590d00d8c5537886019bc330
SHA10a47c8050b4334880a92f6ba758db85cf1716045
SHA2565c8a4f97a4401e3dbed6b62efb4d5e4b91a65ee19442cacc05b98f395ffa852b
SHA512aeff5c046817abe9449bddff25f587d0f6c33d0e587ca6ebef8747212bc1fa3c8337dc84f78ca9330fa16ee949fa788103da0160a335acedf1d442665fce1368
-
Filesize
85KB
MD5b5d986697e72cc0554e699510741e46a
SHA1bee206bb66f98529c01f5bea56169dcc36addc27
SHA2563efb733026ae60c8394d85c9d7f3c65dcd83f12450bfc9cea4ebddebccb53274
SHA5125d1dccfd6fa157fa3e302356bc89caf750476f3a48eab2647df05ae3da364f91e214f7bcc7d1ca6128a368327c063284a09bcd9713a178ef555518eddb0686d9
-
Filesize
1KB
MD5dd78294442f84738f80f8482da37af86
SHA1c78ad509e2177239c23444b7bffaffe176b881bf
SHA25643beaeb3f42e7bdfb2a2a06877111c6fbf995db62752c46c85f7d1d0db3e4518
SHA51291cdcc31f734a8d24bb3e61232e9ca8eb83654546f1f820147dcf024082b992bfc6df5448c3f5a0fcdc4fd75ce1f8610d39dd649014778898747c32821770036
-
Filesize
1KB
MD5a6360dec28a223e337f21eed32780ae2
SHA1fc868563be77f5e61a6f1ba206bc93f1ba9a4295
SHA256229f94db2aa996c5d792bea291df2a442a1679423c24e28aaa0a086d81c0204c
SHA5122273e6bdfee142d8d4cb8cfb881517520db9f29b5c554d6bd5560c4ea42121bbfe2df9d84c9032d4685f46dc959310acdac408579085951a73151cd1f4e08222