Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_98213d5695567131c847160bfc05f13e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98213d5695567131c847160bfc05f13e.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_98213d5695567131c847160bfc05f13e.exe
-
Size
674KB
-
MD5
98213d5695567131c847160bfc05f13e
-
SHA1
8db61294e2c10364533f858047c5bb755327a425
-
SHA256
a4ebe8702456763f2331e3beff3cdbc23b2c4087f9b6e00fcea04e6c0bc0b238
-
SHA512
5e79743faa6d870e8936bdf86be17156a3bcb53800d0be2ec844bfeabcbf65d2479c479647a30be67ab99c2961a3df1fbd82c419a8ab9be50d8ecdeb5e54f860
-
SSDEEP
12288:5NAHr5Vnu0rLysASCvrabYNcvCLBtm+M5vTP2d65sUFX0+sHe5dWvF+pYj/6n7no:C7ParV8a5vHH78JG4/yaOsB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4404 csrss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Start Edition = "/Windows/" csrss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\inf\ress\csrss.dll JaffaCakes118_98213d5695567131c847160bfc05f13e.exe File created C:\WINDOWS\inf\ress\open.bat JaffaCakes118_98213d5695567131c847160bfc05f13e.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csrss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98213d5695567131c847160bfc05f13e.exe -
Kills process with taskkill 1 IoCs
pid Process 1372 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4404 csrss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1372 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 392 wrote to memory of 2400 392 JaffaCakes118_98213d5695567131c847160bfc05f13e.exe 83 PID 392 wrote to memory of 2400 392 JaffaCakes118_98213d5695567131c847160bfc05f13e.exe 83 PID 392 wrote to memory of 2400 392 JaffaCakes118_98213d5695567131c847160bfc05f13e.exe 83 PID 392 wrote to memory of 1372 392 JaffaCakes118_98213d5695567131c847160bfc05f13e.exe 84 PID 392 wrote to memory of 1372 392 JaffaCakes118_98213d5695567131c847160bfc05f13e.exe 84 PID 392 wrote to memory of 1372 392 JaffaCakes118_98213d5695567131c847160bfc05f13e.exe 84 PID 2400 wrote to memory of 4404 2400 cmd.exe 87 PID 2400 wrote to memory of 4404 2400 cmd.exe 87 PID 2400 wrote to memory of 4404 2400 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98213d5695567131c847160bfc05f13e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98213d5695567131c847160bfc05f13e.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\WINDOWS\inf\ress\open.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\WINDOWS\inf\ress\csrss.exeC:\WINDOWS\inf\ress\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4404
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cmd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5d505149cb8d11fac41a0beb054bedde4
SHA1d70b29e8cffcece143069626d0e6b8f614da1591
SHA256c9452fb2b04a63b395270befc793a6e4a97993d87dfa14d446fd0514b9cc1069
SHA5121c4471b0be696bcb7b1816f2273ed65db512848ed9866d7380642749db583a8cfc52274421d95ec1042da24b16ed767da2fd766df0e03fb5b5232daeff0d2d51
-
Filesize
83B
MD5abde6a7841e0540ed444051a9f86b725
SHA11cc6ba90f1670863020f9b179912727e8c697e02
SHA2564816d36133b30032622d12e069391acb10b4177ee74c9077587c0a93f4e7e3e4
SHA512e17a5d18154ef36778d833009ca5abc43e0de95c15225231501649e560bfea52d5aa348f99036af400822ff66f341e3f4c60c3362aa41c53c9364ae425a24a96