Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 23:25
Behavioral task
behavioral1
Sample
273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe
-
Size
677KB
-
MD5
273384167f5c38610b99d07c1e2f8f7d
-
SHA1
ef5635705f73debbb84ee477227c2d1b072e62a7
-
SHA256
248eb241f31c08846e90155fdbc72336e77979e1c33ba812874cb82affd57122
-
SHA512
240efaa6b83e07d7f3ae4a14435840dfd3dd43d784c18cb4f51f4799f0f086fd14b134b9c767218184b63816fa83ddef4db64ee8f2e4885e10ccf55a4e7031b0
-
SSDEEP
12288:YQ+8YcSdcdp7GqDd7o4YINDz6/AAgYShiuFfIihBtwVabCMUA4+6vlF75:UiSmrpDd75d68hiuF5H8abCMUN+YlFN
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3636-0-0x0000000000400000-0x00000000005CC000-memory.dmp upx behavioral2/memory/3636-15-0x0000000000400000-0x00000000005CC000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1004 3636 WerFault.exe 83 4932 3636 WerFault.exe 83 -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe 3636 273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\273384167f5c38610b99d07c1e2f8f7d_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
PID:3636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 20202⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 27162⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3636 -ip 36361⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3636 -ip 36361⤵PID:4984