Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe
-
Size
167KB
-
MD5
56e7175fdb315b23eb2f83798a6b671e
-
SHA1
e27c385f2c1a7e28e3b412349c9916d90bb5a84a
-
SHA256
b5dcfb7d3cc9da1dd16eb433cbf0fe67c1593fd1c911b647f3dc6555e06bd0e9
-
SHA512
46afae0e50c207fd2e094011a0d5034e9a1bf8e0fa86c5f2ee88b3fdb087fb737ca908722958f4e16e9d1d52af8dc4106d8c1123f6d86c5ec3357a6a5b903f5e
-
SSDEEP
3072:5Zo8G4tsoOSFxW6Oh7zdq+PV+F+MKciWCPepKFeli/tsTrT1KOnV6QI7:7lJRFxMxRP+KciWU9YatygOVzi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4676 D232F5B69CB.exe 4860 D8eAA88.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0V3DUA4J7E8DWUZCCJEA = "C:\\cleansweep\\D232F5B69CB.exe /q" D8eAA88.exe -
resource yara_rule behavioral2/memory/3692-4-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/3692-5-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/3692-6-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/3692-10-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/4676-20-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/4676-21-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/4676-22-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/4676-23-0x0000000000400000-0x0000000000486000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D232F5B69CB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D8eAA88.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\PhishingFilter D8eAA88.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" D8eAA88.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" D8eAA88.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Internet Explorer\Recovery D8eAA88.exe Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" D8eAA88.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 4676 D232F5B69CB.exe 4676 D232F5B69CB.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe 4860 D8eAA88.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Token: SeDebugPrivilege 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Token: SeDebugPrivilege 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Token: SeDebugPrivilege 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe Token: SeDebugPrivilege 4676 D232F5B69CB.exe Token: SeDebugPrivilege 4676 D232F5B69CB.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe Token: SeDebugPrivilege 4860 D8eAA88.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3692 wrote to memory of 4676 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 87 PID 3692 wrote to memory of 4676 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 87 PID 3692 wrote to memory of 4676 3692 56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe 87 PID 4676 wrote to memory of 4860 4676 D232F5B69CB.exe 88 PID 4676 wrote to memory of 4860 4676 D232F5B69CB.exe 88 PID 4676 wrote to memory of 4860 4676 D232F5B69CB.exe 88 PID 4676 wrote to memory of 4860 4676 D232F5B69CB.exe 88 PID 4676 wrote to memory of 4860 4676 D232F5B69CB.exe 88 PID 4860 wrote to memory of 3692 4860 D8eAA88.exe 83 PID 4860 wrote to memory of 3692 4860 D8eAA88.exe 83 PID 4860 wrote to memory of 3692 4860 D8eAA88.exe 83 PID 4860 wrote to memory of 3692 4860 D8eAA88.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\56e7175fdb315b23eb2f83798a6b671e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\cleansweep\D232F5B69CB.exe"C:\cleansweep\D232F5B69CB.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\D8eAA88.exe"C:\Users\Admin\AppData\Local\Temp\D8eAA88.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
5KB
MD5937d1d2fc50e92ca749503a06fb23ef0
SHA1487ecc8343726941f7c3ef530fa887912e6255f2
SHA25658f18af48110a661afade234e479793d29fc5313f1389c95238d8d82a54b887f
SHA512d95385e7ba4945033373bc3f2cdae19e63cae34a13e2fb89aa4eca5abf2de098b5d3175e2f7993a3dc0aeb32e4ba02ad257db7251cf0671127d1cd7f707b8a8e
-
Filesize
167KB
MD556e7175fdb315b23eb2f83798a6b671e
SHA1e27c385f2c1a7e28e3b412349c9916d90bb5a84a
SHA256b5dcfb7d3cc9da1dd16eb433cbf0fe67c1593fd1c911b647f3dc6555e06bd0e9
SHA51246afae0e50c207fd2e094011a0d5034e9a1bf8e0fa86c5f2ee88b3fdb087fb737ca908722958f4e16e9d1d52af8dc4106d8c1123f6d86c5ec3357a6a5b903f5e