Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2025, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe
-
Size
34KB
-
MD5
279ccd16a9d80a66314b62a23cbd239a
-
SHA1
cee65c61b418920c8f54000fe44bfff2f6af7978
-
SHA256
e0375f90963663238e25c76df5dccfe753f2ee62bb5c73767d7f0745eb29d5b5
-
SHA512
5b6a85e6bd99c5b8f78b5557b001eddf779e0f8249e18a74f8121799ea583c259d08c2a414a7527fab30f4c103cff9df6be37cad9002cdc407576f0c065adb62
-
SSDEEP
768:dW0mUuSGqv4DRMFU4MVwu3U9oRBSsIC4nZpbd32:dMdAXf8f4oRBSsR4Zf
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" rundll32.exe -
Windows security bypass 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rundll32.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 47 4040 rundll32.exe 54 4040 rundll32.exe -
Modifies Shared Task Scheduler registry keys 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler exeha2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{F33812FB-F35C-4674-90F6-FD757C419C51} = "DDE" exeha2.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 3 IoCs
pid Process 3488 exeha2.exe 2396 exeha3.exe 1412 services.exe -
Loads dropped DLL 5 IoCs
pid Process 3488 exeha2.exe 3488 exeha2.exe 3488 exeha2.exe 3488 exeha2.exe 4040 rundll32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xp_system = "C:\\Windows\\inet20099\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\xp_system = "C:\\Windows\\inet20099\\services.exe" services.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\exeha2.exe JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe File created C:\Windows\SysWOW64\exeha3.exe JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe File created C:\Windows\SysWOW64\birdihuy32.dll exeha2.exe File created C:\Windows\SysWOW64\birdihuy.dll exeha2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inet20099\services.exe exeha3.exe File opened for modification C:\Windows\inet20099\services.exe exeha3.exe File opened for modification C:\Windows\system.ini services.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exeha3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exeha2.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Security rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Security\sox_id = "117365117277" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Security rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Security\rpt = "9632" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Security\sox_ver = "0" rundll32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\WOW6432Node\CLSID\{F33812FB-F35C-4674-90F6-FD757C419C51}\InProcServer32 exeha2.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\WOW6432Node exeha2.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\WOW6432Node\CLSID exeha2.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\WOW6432Node\CLSID\{F33812FB-F35C-4674-90F6-FD757C419C51} exeha2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\WOW6432Node\CLSID\{F33812FB-F35C-4674-90F6-FD757C419C51}\InProcServer32\ = "C:\\Windows\\SysWow64\\birdihuy32.dll" exeha2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\WOW6432Node\CLSID\{F33812FB-F35C-4674-90F6-FD757C419C51}\InProcServer32\ThreadingModel = "Apartment" exeha2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 752 wrote to memory of 3488 752 JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe 82 PID 752 wrote to memory of 3488 752 JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe 82 PID 752 wrote to memory of 3488 752 JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe 82 PID 3488 wrote to memory of 4040 3488 exeha2.exe 83 PID 3488 wrote to memory of 4040 3488 exeha2.exe 83 PID 3488 wrote to memory of 4040 3488 exeha2.exe 83 PID 752 wrote to memory of 2396 752 JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe 84 PID 752 wrote to memory of 2396 752 JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe 84 PID 752 wrote to memory of 2396 752 JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe 84 PID 2396 wrote to memory of 1412 2396 exeha3.exe 85 PID 2396 wrote to memory of 1412 2396 exeha3.exe 85 PID 2396 wrote to memory of 1412 2396 exeha3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_279ccd16a9d80a66314b62a23cbd239a.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\exeha2.exeC:\Windows\system32\exeha2.exe2⤵
- Modifies Shared Task Scheduler registry keys
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\birdihuy32.dll, load3⤵
- Modifies security service
- Windows security bypass
- Blocklisted process makes network request
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:4040
-
-
-
C:\Windows\SysWOW64\exeha3.exeC:\Windows\system32\exeha3.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\inet20099\services.exeC:\Windows\inet20099\services.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1412
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62B
MD5851ae078a541f99b05e0f7d337f0a428
SHA153b2107e2909a3fefcc4b5c81b992aa799b76ffd
SHA256df00396a229cdb5cd40d745f5f148a5f9d6272c7f2b6d910078257dfd0b02541
SHA5123e07cc70dd57cabc298a59a30ce6d2369051f5bb438975ae80a3455be2ad1fcf6541f64cbe3e38700e02627e38cbfea1946717aa9687a6e1c92b74afa0968462
-
Filesize
28KB
MD59f1c675391021bfb71436abda96e23a1
SHA14128e1ecaa454dba81eefc345c675b8a28810d37
SHA2562671cfb8c30c87ad32d265bc2e3ffbf74fd26008befb639889445c7125b519d8
SHA51228394acfceb70f66eb418631ee9d41e30c9dd59fbc4057958a0cb2e94fdd9e8400a952fb06100c38bcbdfaa29363a2bc9bc0db9449b23f764fbe54e88873a0bf
-
Filesize
11KB
MD55310d379b453f06b4a55a9628ac7caa1
SHA1a5b0b9ea3650692dd77a77b0447c2d862db87638
SHA256c62a64c3a9930c74b20b4146c9dec04839b854d16c5d3a00042e35e02f206db7
SHA51220b4836c3116afb9274e9a929a58bb5a37ad5a9b37339151c18fe8b96cca0d500ba11b4daca30ec11a684059324aa68d51622861ef8fbbf3d41e8d0bc1113082
-
Filesize
12KB
MD580ae1a8241952ad7d36570c12c53e10f
SHA1b99f8ded2fcb2ae5bd30cd98f99bbfa95cb49110
SHA256cab5da73db1e3e9a65e68a9b3bac86322e2508a581f0de0b4e3e7fb66de066e7
SHA512b829228605e2d278a0de1f368372db38a15cd3a632d0dbeb29c76cec98ec172d7be6796d34978080d82820e6f53ac7190e67b7409a18e925eb7fb6a619976b68