Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
86b8b1e78425ed0a8b6daee15ae8a0fd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
86b8b1e78425ed0a8b6daee15ae8a0fd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$_3_.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$_3_.exe
Resource
win10v2004-20240426-en
General
-
Target
$_3_.exe
-
Size
1.8MB
-
MD5
77bfacca17ee1d89833b57f3a746d9a0
-
SHA1
aa9490c913489c5eafd02f67f875efcb56d23036
-
SHA256
38571b0965110d07c6fbf4813ab628d4017cf52c681c457fb3f184b644fb0b52
-
SHA512
21ecc2fce94a58cd39127964730b01722b9dafa20d3af65b023fe83188c08211ba1324849513ffc10b6a359737f98c4d06770dc1954f8880daff938a06581e6f
-
SSDEEP
49152:/SNY8H0ZGF5j51XdQTPRPgojx1NslvUOl/WkMWAH:oY00Z8F1XdUL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation $_3_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4884 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1476 $_3_.exe 1476 $_3_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1476 $_3_.exe 1476 $_3_.exe 1476 $_3_.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1476 wrote to memory of 2768 1476 $_3_.exe 95 PID 1476 wrote to memory of 2768 1476 $_3_.exe 95 PID 1476 wrote to memory of 2768 1476 $_3_.exe 95 PID 2768 wrote to memory of 4884 2768 cmd.exe 97 PID 2768 wrote to memory of 4884 2768 cmd.exe 97 PID 2768 wrote to memory of 4884 2768 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_3_.exe"C:\Users\Admin\AppData\Local\Temp\$_3_.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\23549.bat" "C:\Users\Admin\AppData\Local\Temp\4647C9B671674C3FA253299B0B5008AB\""2⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:4884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214B
MD5739fcc7ba42b209fe44bea47e7a8c48f
SHA1bc7a448a7c018133edcf012bc94301623eb42c5b
SHA25669017cdbbe68396f45e41d211b22d800cc1afc0eadbd3440873038585020315c
SHA5122b2b130798b0f4e534626b9fb5deaa10bb1930e6700ac0ba7cf151c1bf3239039a7032ea67ceed86a4a4dbe981064c42a8e0f88fe8361e27002dd8ceb0ea767a
-
C:\Users\Admin\AppData\Local\Temp\4647C9B671674C3FA253299B0B5008AB\4647C9B671674C3FA253299B0B5008AB_LogFile.txt
Filesize9KB
MD51e6e60e64fa85d6ea80495ea08841b54
SHA1d497f05e80071a7d17e0bb70f8f6ffa3c8cee4a4
SHA256f8f6ce53a4cf8c8eaa8631a8ec85d1e72ae350200ddd23809c8880d1686e2afa
SHA5121af88a5e8347e5b7f90a51ed5ffe29b9531d01ab4604bd9a7f9aafbcfaf9d929071a29ee71946ed06565cd5666fd794198eb45d25a76e5bec6a080265275726c
-
Filesize
110KB
MD59dff5b5b5232064acd59cf38d4b08bf2
SHA1665733eaddd6415e1395f2358b828b790a6ca9a9
SHA256be737c16e2432e883645410439fc77fbc9eac87487db26df41d7d3044c2c2fd7
SHA512b51167c999c083881ae027f66c8135c2a673d8e58c2397022ebcf254b204f0a5cfd455395caada659ecb2bfe074df23398cadee55a4dd69ce618f9d80ff7f67b