Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe
-
Size
169KB
-
MD5
16ea7aa887731711eaa9b1a5ea16cbcd
-
SHA1
5cd80bde8b1ebb7799a2391d69ac7b77fa986e51
-
SHA256
1a3c06fc73d6797ef88e7a71b9541515564a7ee9e041b6b949e838eab5e160aa
-
SHA512
2bea59055a67b20784f3d80fc419563704d445b9693482c335b0660cdbde6326e23e55a5f050af3153bb41dae49111af13ff52024168f275e9ba29fc00a9b4fe
-
SSDEEP
3072:jDhGp7Uo0+yDugLH//07iDKHIHmRNABHYGqGIw2soU+GRNx2N2ydV51rS4y:wBczDud7SKHIGfABRqpp3U+as2ID
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\Control Panel\International\Geo\Nation 16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 768 ridmj.exe -
Loads dropped DLL 1 IoCs
pid Process 768 ridmj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 17 IoCs
pid pid_target Process procid_target 3052 4924 WerFault.exe 81 4308 4924 WerFault.exe 81 4556 4924 WerFault.exe 81 4632 4924 WerFault.exe 81 2708 4924 WerFault.exe 81 5036 4924 WerFault.exe 81 2932 4924 WerFault.exe 81 1500 4924 WerFault.exe 81 3552 768 WerFault.exe 111 864 768 WerFault.exe 111 4400 768 WerFault.exe 111 4516 768 WerFault.exe 111 1796 768 WerFault.exe 111 4716 768 WerFault.exe 111 4536 768 WerFault.exe 111 3220 768 WerFault.exe 111 428 768 WerFault.exe 111 -
Kills process with taskkill 1 IoCs
pid Process 3044 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4060 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 768 ridmj.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 768 ridmj.exe 768 ridmj.exe 768 ridmj.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 768 ridmj.exe 768 ridmj.exe 768 ridmj.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4924 wrote to memory of 3048 4924 16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe 101 PID 4924 wrote to memory of 3048 4924 16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe 101 PID 4924 wrote to memory of 3048 4924 16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe 101 PID 3048 wrote to memory of 3044 3048 cmd.exe 105 PID 3048 wrote to memory of 3044 3048 cmd.exe 105 PID 3048 wrote to memory of 3044 3048 cmd.exe 105 PID 3048 wrote to memory of 4060 3048 cmd.exe 107 PID 3048 wrote to memory of 4060 3048 cmd.exe 107 PID 3048 wrote to memory of 4060 3048 cmd.exe 107 PID 3048 wrote to memory of 768 3048 cmd.exe 111 PID 3048 wrote to memory of 768 3048 cmd.exe 111 PID 3048 wrote to memory of 768 3048 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 6242⤵
- Program crash
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 7922⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8682⤵
- Program crash
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8762⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8082⤵
- Program crash
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8762⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 9962⤵
- Program crash
PID:2932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 4924 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\16ea7aa887731711eaa9b1a5ea16cbcd_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\ridmj.exe -f2⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 49243⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:4060
-
-
C:\Users\Admin\AppData\Local\ridmj.exeC:\Users\Admin\AppData\Local\ridmj.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 8764⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 8644⤵
- Program crash
PID:864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 11804⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 11844⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 11764⤵
- Program crash
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 11844⤵
- Program crash
PID:4716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 11164⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 12124⤵
- Program crash
PID:3220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 12404⤵
- Program crash
PID:428
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 1402⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4924 -ip 49241⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4924 -ip 49241⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4924 -ip 49241⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4924 -ip 49241⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4924 -ip 49241⤵PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4924 -ip 49241⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4924 -ip 49241⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4924 -ip 49241⤵PID:1796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 768 -ip 7681⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 768 -ip 7681⤵PID:1792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 768 -ip 7681⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 768 -ip 7681⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 768 -ip 7681⤵PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 768 -ip 7681⤵PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 768 -ip 7681⤵PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 768 -ip 7681⤵PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 768 -ip 7681⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD516ea7aa887731711eaa9b1a5ea16cbcd
SHA15cd80bde8b1ebb7799a2391d69ac7b77fa986e51
SHA2561a3c06fc73d6797ef88e7a71b9541515564a7ee9e041b6b949e838eab5e160aa
SHA5122bea59055a67b20784f3d80fc419563704d445b9693482c335b0660cdbde6326e23e55a5f050af3153bb41dae49111af13ff52024168f275e9ba29fc00a9b4fe