Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 00:25
Behavioral task
behavioral1
Sample
0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
0584eaafd1c6a9717ed152fa58e2ae98
-
SHA1
4f8ed51c529166a0888c442fa75140a52e55f177
-
SHA256
94ffd6447a476d7e72105ffe77a99895432507c47b3507ca0a5d19da2eccff14
-
SHA512
b9f87a072aeef6a4e630b5bd8bbcc4dde351feb00feb43547d3154c965c8dfb32bab2955481043eba93584cbcb5419f5e5999ae9273ba4f3d59d620128061d41
-
SSDEEP
49152:+fkZ39Y6KE1yh8S7OdGdzklRSgXg8s2uihuG/PpnwZ:Skp9Ryh8RzlUgVsv+OZ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\R: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\V: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\H: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\K: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\G: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\J: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\W: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\A: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\E: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\N: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\Q: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\X: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\Y: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\B: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\I: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\O: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\S: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\T: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\U: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\Z: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\L: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe File opened (read-only) \??\M: 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3372 5100 WerFault.exe 83 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5100 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe 5100 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5100 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe 5100 0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0584eaafd1c6a9717ed152fa58e2ae98_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 5282⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5100 -ip 51001⤵PID:4012