Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2025, 09:48
Behavioral task
behavioral1
Sample
JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe
-
Size
28KB
-
MD5
78fbf49448456b9f575a8cbf662eb973
-
SHA1
ac653037c15c63be796597468693bb9aef51256b
-
SHA256
4fab4cdb6a98bc0c5a4f06890876585a4b56a950151a668cd86a4834d5c0a0a2
-
SHA512
08c20e3531741b2cbca0d44bec79a82730e5757764f31179754fc561fb0b47ea8e5771b393d8c00f4b583b2e77cb523883b28f495ddb9e2fd0c2d6590ca228e5
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyN8u:Dv8IRRdsxq1DjJcqfy
Malware Config
Signatures
-
Detects MyDoom family 1 IoCs
resource yara_rule behavioral2/memory/1432-13-0x0000000000500000-0x0000000000510000-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 2292 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/1432-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/files/0x00080000000241e6-4.dat upx behavioral2/memory/2292-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1432-13-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral2/memory/2292-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2292-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x00080000000241e7-33.dat upx behavioral2/memory/2292-35-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2292-40-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe File opened for modification C:\Windows\java.exe JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe File created C:\Windows\java.exe JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4364 taskmgr.exe Token: SeSystemProfilePrivilege 4364 taskmgr.exe Token: SeCreateGlobalPrivilege 4364 taskmgr.exe Token: 33 3692 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3692 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe 4364 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1432 wrote to memory of 2292 1432 JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe 85 PID 1432 wrote to memory of 2292 1432 JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe 85 PID 1432 wrote to memory of 2292 1432 JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78fbf49448456b9f575a8cbf662eb973.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4364
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x524 0x51c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD578fbf49448456b9f575a8cbf662eb973
SHA1ac653037c15c63be796597468693bb9aef51256b
SHA2564fab4cdb6a98bc0c5a4f06890876585a4b56a950151a668cd86a4834d5c0a0a2
SHA51208c20e3531741b2cbca0d44bec79a82730e5757764f31179754fc561fb0b47ea8e5771b393d8c00f4b583b2e77cb523883b28f495ddb9e2fd0c2d6590ca228e5
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2