Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe
-
Size
49KB
-
MD5
2a4c8edbdb4a32136621c31a287fa166
-
SHA1
4dbd09490a6cd243877aae6c861e27db05837f3f
-
SHA256
9b2e76db4fa2b3f711fb181e2fe1c4611bef0fe432da0ed47e1f77b7a66e700e
-
SHA512
d1741725d53da6a73c2c03cf596367c0771b8ce182d6c6d289d54bc25deffec725c2a34503bb6816fa074ced5cecbb516df61b81845913d8893dc8a3e795ffa8
-
SSDEEP
1536:ONp7pcokmb7WK19SuDsXYtCrlU+C5awO:OTxkmDf/DWYtCrllOa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation 2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\braviax.exe 2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4952 wrote to memory of 5032 4952 2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe 86 PID 4952 wrote to memory of 5032 4952 2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe 86 PID 4952 wrote to memory of 5032 4952 2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a4c8edbdb4a32136621c31a287fa166_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "2⤵PID:5032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230B
MD52fe9690a60d4bd27f3c4ddd736cde8b7
SHA1d0f8bca883789b124e48068ce30b532ce20e6607
SHA2568ca96cd4b3176b2f00e045a677c6e30b3e41bdfdcf2b891b2b0ec377bcf6936e
SHA512d31c1d3f3f9a2c2800daa8bbc561d9ae35bb8beff9a73dc9e2034bcb528d9f7eea10acd4fe630900e5dc13203fa62b6ba851025eb100edb94e70186cdfdd20f3