Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe
-
Size
3.5MB
-
MD5
f7c7f796efa9d426820550fe7436fdac
-
SHA1
4a3902551497203b2f335cc0375c3a4dd6c4fed0
-
SHA256
4783556e306a33d0f2b82a4b252d64947c84af40d8219cc9c24892552f6f4d8c
-
SHA512
f7df1cf6067aab2818f6b2739f11707ec03141bbc1b87a62c9e1c34f91af00620f63c174388736557d83135ce1b4f42593a590622112928383c0b88244bffcfd
-
SSDEEP
98304:I/qAVyk9q/MtommYK9zKAc0MymmYK9zKAc0M:xswxmmYK9+AcdymmYK9+Acd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation EA21.tmp -
Executes dropped EXE 2 IoCs
pid Process 3292 EA21.tmp 3952 f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3292 EA21.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3952 f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe 3952 f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe 3952 f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe 3952 f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4948 wrote to memory of 3292 4948 f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe 90 PID 4948 wrote to memory of 3292 4948 f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe 90 PID 4948 wrote to memory of 3292 4948 f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe 90 PID 3292 wrote to memory of 3952 3292 EA21.tmp 91 PID 3292 wrote to memory of 3952 3292 EA21.tmp 91 PID 3292 wrote to memory of 3952 3292 EA21.tmp 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\EA21.tmp"C:\Users\Admin\AppData\Local\Temp\EA21.tmp" --pingC:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe E02C00A5383EE402D95A9FD7B9BD30FF12ED32B10191CDE72884CF5DAD084213E9EFBFDBFD9185DF3EAC415EABCADE0846C07F910C38F7FC5E3C228498A7A6172⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3952
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4124 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD500cbcb2d16bee70602c1bc7f4b3fdf16
SHA19e370146933a8f909a5b0aed2b89ff5093117a12
SHA256c01a892f926d58c42c13c61198d39c47db4ccae1685613ee35943943078e2c5f
SHA5129b85f37ee4e1b4636640613a71f04564eca9a917f0258b099a2db87d184295611dbc9e48f810ba10ac01dcb7e639958c47d3b22760d5e42d5e7242eae5cc53b5
-
Filesize
1.1MB
MD5cd75d3e263ff0d1d13aad24cdb9f2593
SHA1cbcf46c2524176ce03cbfdb69017788282e495a5
SHA256ccac4ef83f1484c207be895e40037f23138d911c1ec537ffd6577ef789c974c4
SHA51216c489e2a2337bb7d23b5d6507d769a62d2c4ffd6b30c237752ab38c935eb92dcf74c75b972279f95617d82de69f25c53db819ddc1e543e35d89ad0956c3df87