Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe
-
Size
401KB
-
MD5
0d6d6fe2f3666f22ae1773e0cd7c5bab
-
SHA1
9c2abce854fab21044e4d90dbbfcf5b96c9ce0ac
-
SHA256
30193d6ac17ae011fe6c3524130cb6bc44da7ef2dd081e3efbcb4b92ef1a2fec
-
SHA512
6270ff3783f6bfbb36e34d69e425a2a018637058ac0ae3fde51052319bcdd2b9202d07aad1be4bc9c3d2fdfcf5516babfda7a8967bd85f5affcb3fe08c4e5b86
-
SSDEEP
12288:w9IEr7LVvNJ0pelp1cRImysfO1w68hQaX1:V6FvYelTmyyOS6IQaF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wucault.exe 0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wucault.exe 0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3276 wucault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe 3276 wucault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1752 wrote to memory of 3276 1752 0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe 81 PID 1752 wrote to memory of 3276 1752 0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe 81 PID 1752 wrote to memory of 3276 1752 0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0d6d6fe2f3666f22ae1773e0cd7c5bab_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wucault.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\wucault.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD500394098c6b4a6ece2472d5a5b16dc40
SHA1c41649003d6d8c6562b79c9e64213bf8c120802e
SHA25625db631b0c979e5c7c1270304381ac1c1932fe4c97c01b8cc5275ef6ca4258f5
SHA512a8ebed74424885388fd0bfa1ebd873195ca13bbb94bf7d1760ca2be0124d69bd6b2628d94f3c18e09632f75413f4c7ed6f4d00bc54156972bf0e14e6a82ca0ff