Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe
-
Size
452KB
-
MD5
a48c18eb8e4e35b669ed9ea252652fa3
-
SHA1
fcd15abd1a4ce7d967c917351ad7390d177d18b4
-
SHA256
c92da775a6532d11d569a42e704de2fbc42485b29ecc3c90cfa3468d030e174b
-
SHA512
7641d12dfd62a79ef8472660668f98f151e5af250ef30d95d35bc48a1ca2a643f2bf178e1d2e2d86b3a4f9bafd824660e333d76fe9e10b34309fe3eafaff0e26
-
SSDEEP
6144:ise2g/+INC7rGN3bkty0Mki8787O71rkhJSammcmZxRL0hb:iZI7rGNrkty0fkhAlmvPKb
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation new4.exe -
Executes dropped EXE 2 IoCs
pid Process 1936 new4.exe 2020 new4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Data Serivce = "new4.exe" a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 748 set thread context of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 1936 set thread context of 2020 1936 new4.exe 87 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\new4.exe a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe File opened for modification C:\Windows\new4.exe a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language new4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language new4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 1936 new4.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 748 wrote to memory of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 748 wrote to memory of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 748 wrote to memory of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 748 wrote to memory of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 748 wrote to memory of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 748 wrote to memory of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 748 wrote to memory of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 748 wrote to memory of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 748 wrote to memory of 2024 748 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 83 PID 2024 wrote to memory of 4724 2024 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 84 PID 2024 wrote to memory of 4724 2024 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 84 PID 2024 wrote to memory of 4724 2024 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 84 PID 2024 wrote to memory of 1936 2024 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 86 PID 2024 wrote to memory of 1936 2024 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 86 PID 2024 wrote to memory of 1936 2024 a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe 86 PID 1936 wrote to memory of 2020 1936 new4.exe 87 PID 1936 wrote to memory of 2020 1936 new4.exe 87 PID 1936 wrote to memory of 2020 1936 new4.exe 87 PID 1936 wrote to memory of 2020 1936 new4.exe 87 PID 1936 wrote to memory of 2020 1936 new4.exe 87 PID 1936 wrote to memory of 2020 1936 new4.exe 87 PID 1936 wrote to memory of 2020 1936 new4.exe 87 PID 1936 wrote to memory of 2020 1936 new4.exe 87 PID 1936 wrote to memory of 2020 1936 new4.exe 87 PID 4724 wrote to memory of 3024 4724 cmd.exe 88 PID 4724 wrote to memory of 3024 4724 cmd.exe 88 PID 4724 wrote to memory of 3024 4724 cmd.exe 88 PID 3024 wrote to memory of 4872 3024 net.exe 89 PID 3024 wrote to memory of 4872 3024 net.exe 89 PID 3024 wrote to memory of 4872 3024 net.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a48c18eb8e4e35b669ed9ea252652fa3_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:4872
-
-
-
-
C:\Windows\new4.exe"C:\Windows\new4.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\new4.exeC:\Windows\new4.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2020
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
452KB
MD5a48c18eb8e4e35b669ed9ea252652fa3
SHA1fcd15abd1a4ce7d967c917351ad7390d177d18b4
SHA256c92da775a6532d11d569a42e704de2fbc42485b29ecc3c90cfa3468d030e174b
SHA5127641d12dfd62a79ef8472660668f98f151e5af250ef30d95d35bc48a1ca2a643f2bf178e1d2e2d86b3a4f9bafd824660e333d76fe9e10b34309fe3eafaff0e26
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227