Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
36ebf88760171aa492d3f5d5feb07967_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
36ebf88760171aa492d3f5d5feb07967_JaffaCakes118.exe
-
Size
364KB
-
MD5
36ebf88760171aa492d3f5d5feb07967
-
SHA1
0f2ca375bc82bae4b21643e6c2bdc96bdc9057d2
-
SHA256
9386cf72718d9ecc9d7a3ba3163e12066d468a580502eb06b0683185d56efb1e
-
SHA512
34ef33c75e4ab382dbd0bcddc7c2f0ec5d36fe1284c46089b4889b1a3e7f1cb059a6822498de41912133503b4c4cb295cd3131cc5959309b07e0b0831b5391f0
-
SSDEEP
6144:z/T3zd9AVAixibDqwbKhqjX9kjeKHYFqoECLrLnZF7tGUP+BgkTbXD/3/8:z/XM4DShe9EcHPLrLZ5AICgkTP3/8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 36ebf88760171aa492d3f5d5feb07967_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3516 Server.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3516 Server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1384 wrote to memory of 3516 1384 36ebf88760171aa492d3f5d5feb07967_JaffaCakes118.exe 84 PID 1384 wrote to memory of 3516 1384 36ebf88760171aa492d3f5d5feb07967_JaffaCakes118.exe 84 PID 1384 wrote to memory of 3516 1384 36ebf88760171aa492d3f5d5feb07967_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\36ebf88760171aa492d3f5d5feb07967_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\36ebf88760171aa492d3f5d5feb07967_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Roaming\Server.exe"C:\Users\Admin\AppData\Roaming\Server.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5410fc86247afe385e2f97da723ea9611
SHA19d9c5763ab7d1ec4ea7fdbcdfae718879e43df69
SHA256b5117963db874571e2380dcdfa794164527ac5dc22d79a9efa4471c8ecd1af2e
SHA512edde0974187e7e8f27096a6692f548e65f6eceab5826285f0b3aeee22837dfdc90ea3d7dc499b912e3af02e2a3dbd8de7f86632a4ba48ca8b7b877e3e82606fd