Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 13:38
Static task
static1
Behavioral task
behavioral1
Sample
1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe
-
Size
128KB
-
MD5
1b80613ac090d4eecfdd6554d4290b7b
-
SHA1
52ee1d680eb6394897e5854027f2eadc76acba2e
-
SHA256
f7f8376c3a4289f5ba02262cad0889c8f8572b0dac37226e37e71132a20ed825
-
SHA512
c2399e167628b579addfea8250ea63475f70bafc51c2bca4d0bc4fe2d82e7623ac008e1121f805a3a082ca8d4db4286450cfe61abc7d7f43cb1c84a0bf834d95
-
SSDEEP
3072:5zrl/nonoroxGDi73tCg3qilL42wA52jOMkrc0:5zrl/nonoroxGDFg3qilL42IjOPrD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation jusched.exe -
Executes dropped EXE 2 IoCs
pid Process 888 jusched.exe 3956 jusched.exe -
Unexpected DNS network traffic destination 10 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4336 set thread context of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 888 set thread context of 3956 888 jusched.exe 95 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2852 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 2852 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 3956 jusched.exe 3956 jusched.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4336 wrote to memory of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 4336 wrote to memory of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 4336 wrote to memory of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 4336 wrote to memory of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 4336 wrote to memory of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 4336 wrote to memory of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 4336 wrote to memory of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 4336 wrote to memory of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 4336 wrote to memory of 2852 4336 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 86 PID 2852 wrote to memory of 888 2852 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 94 PID 2852 wrote to memory of 888 2852 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 94 PID 2852 wrote to memory of 888 2852 1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe 94 PID 888 wrote to memory of 3956 888 jusched.exe 95 PID 888 wrote to memory of 3956 888 jusched.exe 95 PID 888 wrote to memory of 3956 888 jusched.exe 95 PID 888 wrote to memory of 3956 888 jusched.exe 95 PID 888 wrote to memory of 3956 888 jusched.exe 95 PID 888 wrote to memory of 3956 888 jusched.exe 95 PID 888 wrote to memory of 3956 888 jusched.exe 95 PID 888 wrote to memory of 3956 888 jusched.exe 95 PID 888 wrote to memory of 3956 888 jusched.exe 95 PID 3956 wrote to memory of 2292 3956 jusched.exe 96 PID 3956 wrote to memory of 2292 3956 jusched.exe 96 PID 3956 wrote to memory of 2292 3956 jusched.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" DEL:C:\Users\Admin\AppData\Local\Temp\1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe"C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" DEL:C:\Users\Admin\AppData\Local\Temp\1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files (x86)\Common Files\Java\Java Update\jusched .exe"C:\Program Files (x86)\Common Files\Java\Java Update\jusched .exe" "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" DEL:C:\Users\Admin\AppData\Local\Temp\1b80613ac090d4eecfdd6554d4290b7b_JaffaCakes118.exe5⤵PID:2292
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD58c25f39b3483461174896b6960b166fa
SHA13e40b0211222643212feb7d8223e7777084fddcf
SHA25690737eec7b306401f3feeb17f25c70f0bcc8feac111469dc525c477a98fe9ff5
SHA51258d85638c27cd5566ed16aeb9d2a71564f896632e9698c2699f589362a84133f222db76e142a4072f2aa59e2ad273d5d3b5e533876dbdd956e768cfab7fd749c