Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe
-
Size
57KB
-
MD5
3457ee2b683f0408eaf44e2c51382a10
-
SHA1
b2da65fcf01e130f9aed9c87889622fab35cc834
-
SHA256
220b92870d450da5f61290b49f71694a4fb499c7545376c6a77fec260144cade
-
SHA512
c93a63ac379be0654bb160ed8e2dbdd29632c7e574c6ff038d0de415d5bff30b69573aeacb09d3dd3c88d48b9a62c1f6c043102526877fb41821fdc5a299f5bd
-
SSDEEP
768:/PE4Nc2avjygCkrh3lbOfovo6qAHVUBM8j5/PrL8u4557acjfpPQxy0AHt:/PN2ykrh39moga6O8j1Prm5xaIQxNIt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4772 SErviCes.exe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4772 SErviCes.exe.exe 4772 SErviCes.exe.exe 4772 SErviCes.exe.exe 4772 SErviCes.exe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1392 3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1392 wrote to memory of 4772 1392 3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe 86 PID 1392 wrote to memory of 4772 1392 3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe 86 PID 1392 wrote to memory of 4772 1392 3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe 86 PID 4772 wrote to memory of 3512 4772 SErviCes.exe.exe 56 PID 4772 wrote to memory of 3512 4772 SErviCes.exe.exe 56 PID 4772 wrote to memory of 3512 4772 SErviCes.exe.exe 56 PID 4772 wrote to memory of 3512 4772 SErviCes.exe.exe 56 PID 4772 wrote to memory of 3512 4772 SErviCes.exe.exe 56 PID 4772 wrote to memory of 3512 4772 SErviCes.exe.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3457ee2b683f0408eaf44e2c51382a10_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\SErviCes.exe.exe"C:\Users\Admin\AppData\Local\Temp\SErviCes.exe.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5a9f909076bdf0b333fc064a8154782f7
SHA1f9a6058d2bd617f72564d87ca27695f26fe9ed45
SHA2560c06eed1863ebbc160308abd2d39817e6b9c0820dadfdac50dc5b8fd3d27064b
SHA512d074f8e2ea559437f34487f2d9caf3afee3a5b46a0f2c31d6e34e54e069d8f2f5e6b14d59053bada9ddd31bff64927e052d0f1eb8fba402e877b67756f2b5da2