Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
1951f2ecc04c0853159309a033522ea2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1951f2ecc04c0853159309a033522ea2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1951f2ecc04c0853159309a033522ea2_JaffaCakes118.exe
-
Size
20KB
-
MD5
1951f2ecc04c0853159309a033522ea2
-
SHA1
5918bc99ad0ba14cd9862a597ae33015608d44b9
-
SHA256
3e1a2cf6764ed3477863d2750c4316f682ed435c4cb61b18581b136ac43ba5ae
-
SHA512
42fd9c83281f74451e4d688795c959931157c1a4a2d612fb2a5488757287ac1fbcc03e2e29a6d3db1f290953bf28ac9e88c67cdfccaf59a0f08a3f64f22f2fc7
-
SSDEEP
384:QLcTQvmFzKbE+QwuC6WREiHQqYBkUn/8yIYNM2Q9HB:QqQmFL+QMC9B1QYJYHB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 1951f2ecc04c0853159309a033522ea2_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation fcbnaf.exe -
Executes dropped EXE 1 IoCs
pid Process 1692 fcbnaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 1692 5112 1951f2ecc04c0853159309a033522ea2_JaffaCakes118.exe 98 PID 5112 wrote to memory of 1692 5112 1951f2ecc04c0853159309a033522ea2_JaffaCakes118.exe 98 PID 5112 wrote to memory of 1692 5112 1951f2ecc04c0853159309a033522ea2_JaffaCakes118.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\1951f2ecc04c0853159309a033522ea2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1951f2ecc04c0853159309a033522ea2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe"C:\Users\Admin\AppData\Local\Temp\fcbnaf.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:3264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD560c7560f46c99194ca6de4633c5ceb7d
SHA1d16f76921b14b8ca68198f856f80e73d8890beb7
SHA2561ed01ca06ca1ae59c14438bdac041db708e4dab3de2b674ab7080d7367a3b5d9
SHA512349d962807d71c256304b9e5441e81412e32961acaabaa1aa3510637161a6d09cbf1cc746a59d67b173f43a7e719a0ffb766cef8276c5e265e8be8bb96354fd9