Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240426-en
General
-
Target
83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
-
Size
789KB
-
MD5
83240a5b529691ae7f4c4d19eea3bd43
-
SHA1
d157c49756024d1fb0a3ae2f146facbda7aae45a
-
SHA256
b5f524fb3ed8f651f1ef5549af543a4a6944dd12074ad91298ea8361769656ce
-
SHA512
f03167fa1f3804862ded22884746eedde136d1694862cd0f84fd849a552486a2385264ad6f06c08020e836550a245b1d398ed015109df8c716df4d1e52ccdce7
-
SSDEEP
12288:mtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44Fv:mt8RHjEgYAw1hZlZTWQu7igcyKPEuj9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5076 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1780 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5076 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 5076 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5076 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 5076 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 5076 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1780 wrote to memory of 5076 1780 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 91 PID 1780 wrote to memory of 5076 1780 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 91 PID 1780 wrote to memory of 5076 1780 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 91 PID 5076 wrote to memory of 1124 5076 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 101 PID 5076 wrote to memory of 1124 5076 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 101 PID 5076 wrote to memory of 1124 5076 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsb82B.tmp/fallbackfiles/'2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4735.bat" "C:\Users\Admin\AppData\Local\Temp\E5712F45190F4D5B9862762DDF01FBEE\""3⤵PID:1124
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3976 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:4052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD58bfb880e59bc4cdb111da27545ff0657
SHA1d02b97db2c158d2038aee45b9b95f7219556fafd
SHA256a48aa387a8bf62023a734098153e3fc852ec2ec8c571a05a92737b00fc4fb186
SHA5129938cde98798e52c315fa215d438ebb356eadf75c8a65f37cb0b8efab19a177e6b5ee7c6f0e33f06b89ceabc982ed136a85b9d92d8dfec814224c85077b23990
-
Filesize
98B
MD59d5a441fb9e4322d65c6336d7c2e7f0d
SHA12c26cb1927c334b833c268308ff0bc7b57e40ef3
SHA25605ac6297cfb8fb5036b731b58e6f4a85c6436cc9cdf123b1bd58c7733293132b
SHA512c87efd21f7adfae41b2381ea78d45c8bab905774063cafe42cf3697fe78096cd09cb3ff378384e26078d9a2a3b3bdd56d0d510410d568dbb591b045f204a0132
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\E5712F45190F4D5B9862762DDF01FBEE\E5712F45190F4D5B9862762DDF01FBEE_LogFile.txt
Filesize9KB
MD5f470a1cf2a758a22da486aab36eb0a08
SHA13b5c28039bac6f49d25e2dd1ba9ee440ea89bdb3
SHA2563896a277e504f7ba9a9be2fc755807e680f7fd0a605c086e30287da76345dccf
SHA5129db0de3301d807c4ef34f47afc8a653384947f78f12dd684065dd06f75a99f7d1cf214c10611d1df8b2c5d9142155b791010c0c0534a4226fec54b0003979c5b
-
Filesize
111KB
MD5e61de3a7331ba6741a775a42fe9db4f4
SHA15111f03e43d6b0f0d4329c6337b31ba46e5311a2
SHA25618844e5d9fcc9b8666198bed385d5498767816d7ec2bd5b3d86e23dd7106bd7f
SHA512bffc02325edf14786124809b58a19c0b073e028c3b39b887be7f1026ef4cfa03f8098a707d2b142bb5f94806f83fd86a073a6ad5072b356e6eb4f204db8251d3
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
Filesize1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066
-
C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118_icon.ico
Filesize17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118_splash.png
Filesize12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b