Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe
-
Size
284KB
-
MD5
0c98d68730551466e56e5d737cf40eea
-
SHA1
d2d2f1a22dc45d5c4fd770c0803d99552e21696c
-
SHA256
2e9044960e212d7356fa16c3c9201c16038539de17a8d013fcd392fde5e3079d
-
SHA512
9b62f9a642a2f1bec307dfd690f90219f94bd198a9949bdcbfaa0eb973991de62b8f065f29348d8b207f47f504a684df4cfb04d5fb6ca0fc116f986c666f9926
-
SSDEEP
3072:ijw4Qta8jqyyAayG8RX3sa/b9cLMYCvr00uwsCvnRpPi9aDOkGuZ1awSDtTiHyUh:MaA85aShZWC8wnO9+OFO1gZTSyQZJ
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
mygrandpa123
Signatures
-
Hawkeye family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation audiodgi.exe -
Deletes itself 1 IoCs
pid Process 3008 svchost.exe -
Executes dropped EXE 4 IoCs
pid Process 3008 svchost.exe 2544 svchost.exe 208 audiodgi.exe 2040 wmpmetwk.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audiodgi.exe" audiodgi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3008 set thread context of 2544 3008 svchost.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language audiodgi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpmetwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 svchost.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 2040 wmpmetwk.exe 3008 svchost.exe 208 audiodgi.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 208 audiodgi.exe 2040 wmpmetwk.exe 2544 svchost.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe 208 audiodgi.exe 208 audiodgi.exe 2040 wmpmetwk.exe 208 audiodgi.exe 3008 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4928 JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe Token: SeDebugPrivilege 3008 svchost.exe Token: SeDebugPrivilege 208 audiodgi.exe Token: SeDebugPrivilege 2544 svchost.exe Token: SeDebugPrivilege 2040 wmpmetwk.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2544 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4928 wrote to memory of 3008 4928 JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe 86 PID 4928 wrote to memory of 3008 4928 JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe 86 PID 4928 wrote to memory of 3008 4928 JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe 86 PID 3008 wrote to memory of 2544 3008 svchost.exe 91 PID 3008 wrote to memory of 2544 3008 svchost.exe 91 PID 3008 wrote to memory of 2544 3008 svchost.exe 91 PID 3008 wrote to memory of 2544 3008 svchost.exe 91 PID 3008 wrote to memory of 2544 3008 svchost.exe 91 PID 3008 wrote to memory of 2544 3008 svchost.exe 91 PID 3008 wrote to memory of 2544 3008 svchost.exe 91 PID 3008 wrote to memory of 2544 3008 svchost.exe 91 PID 3008 wrote to memory of 208 3008 svchost.exe 92 PID 3008 wrote to memory of 208 3008 svchost.exe 92 PID 3008 wrote to memory of 208 3008 svchost.exe 92 PID 208 wrote to memory of 2040 208 audiodgi.exe 96 PID 208 wrote to memory of 2040 208 audiodgi.exe 96 PID 208 wrote to memory of 2040 208 audiodgi.exe 96 PID 2040 wrote to memory of 4828 2040 wmpmetwk.exe 97 PID 2040 wrote to memory of 4828 2040 wmpmetwk.exe 97 PID 2040 wrote to memory of 4828 2040 wmpmetwk.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0c98d68730551466e56e5d737cf40eea.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"C:\Users\Admin\AppData\Local\Temp\System\audiodgi.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exeC:\Users\Admin\AppData\Local\Temp\System\wmpmetwk.exe5⤵PID:4828
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD57181fd8026220e1d084316574364a443
SHA11a230b74205b77969695dbfb84a08ea3e5cb472e
SHA256d6683e9877cf1d8ecf3f95492ddec2ecc5ecadf1cc077d0446e2fc6e10f97f7e
SHA51257e8089dffe3e8f41c535cebb656a66fe5fa39bb7ab6b6095f18245d6fb64aad08cc040066cdd439da33c40cfdf10e852e77dfd66c0d6036419d1043fa883baf
-
Filesize
10KB
MD59c00e96080aa3e13a63abce58b5fc7b2
SHA177460bbe8fdb45ecfb20e81f6157dce0c21b81f0
SHA256cd640236adea952cb9c29388c6b33c49484d9f8fba6d2ab6c1e6b2982160bc3e
SHA5120251361441dc6fba027ece928b796b00bae45af0095ab9333ca0de1cee89068e06b6e37cfabcd8f9b48b31b78ef4f9932f3dc4c57bf77447da9a1721465fb910
-
Filesize
284KB
MD50c98d68730551466e56e5d737cf40eea
SHA1d2d2f1a22dc45d5c4fd770c0803d99552e21696c
SHA2562e9044960e212d7356fa16c3c9201c16038539de17a8d013fcd392fde5e3079d
SHA5129b62f9a642a2f1bec307dfd690f90219f94bd198a9949bdcbfaa0eb973991de62b8f065f29348d8b207f47f504a684df4cfb04d5fb6ca0fc116f986c666f9926