Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe
-
Size
60KB
-
MD5
462d0b018b21abd17a431079705cfc4d
-
SHA1
0d6b7671c8c57daf48e3c642c815f0430d5d698e
-
SHA256
12cf5ce7f8853947dad6853c942edc4a03e201b9995871828b97824861b6054b
-
SHA512
bbd6ca9c18759a39855286a882f84201adf37c287def138d9cbace52d37e19e23808ced552cf6249dcacb322bd582a6191ae4fd46dcbb790a278c5c5e215281a
-
SSDEEP
1536:b7sIiX7vfOMXgzuSM8TWbp7pnDCP8MmiLpP9HKDAI0gb:b7s6RP9HKnb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Isass.dll 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe File created C:\Windows\SysWOW64\winfile29.dll 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4796 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4796 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4796 wrote to memory of 1920 4796 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe 93 PID 4796 wrote to memory of 1920 4796 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe 93 PID 4796 wrote to memory of 1920 4796 462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe 93 PID 1920 wrote to memory of 1196 1920 cmd.exe 95 PID 1920 wrote to memory of 1196 1920 cmd.exe 95 PID 1920 wrote to memory of 1196 1920 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\temp.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\reg.exereg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /d explorer.exe,462d0b018b21abd17a431079705cfc4d_JaffaCakes118.exe /f3⤵
- Modifies WinLogon for persistence
- System Location Discovery: System Language Discovery
PID:1196
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5e2114a3a7a52faa397f0bbc84bf1b81e
SHA19964ef20f2f124eb991d507f2deee51c98fbbc2a
SHA256ac917290544a52c7d8dd6b7706f19d31097a13e0f6839429657390efa574cf6c
SHA512e31f5046a89caa3b35a346d1fee54e44a269fdd87b70f58d822927d804faef20ed7b5baa007d1b94ab3b6bf27e0e7338b28b2af59d8d6778365979708e8bfae2