Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe
-
Size
25KB
-
MD5
371c7e630b6104c46f0fabef61271f17
-
SHA1
3d5e07fcff774c32b315f4ef54fa1c5030125aec
-
SHA256
9770cbdad8be99c95f49a7d8c0822f92900a1f29fe1905b840af83e4b2a3aef5
-
SHA512
1b65baf94ead14aba559ed36d342cd460c1e3287148229da84bd736dc5cedefc9547e4fd48866a5a6b768e7c254fb14d0edb7da0609b925a3c161ed5235ee52f
-
SSDEEP
384:8nSIdMYJpdYtd7wfp2XsWra7ybseEOoYzzumoAoSabOcDhXdvgP2oI7DROwEj1:EvMYWf7XfoYzzu7HDbOcvv5DRpS
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 3620 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2024 3620 WerFault.exe 88 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2900 wrote to memory of 4496 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 85 PID 2900 wrote to memory of 4496 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 85 PID 2900 wrote to memory of 4496 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 85 PID 2900 wrote to memory of 552 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 87 PID 2900 wrote to memory of 552 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 87 PID 2900 wrote to memory of 552 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 87 PID 2900 wrote to memory of 3620 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 88 PID 2900 wrote to memory of 3620 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 88 PID 2900 wrote to memory of 3620 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 88 PID 2900 wrote to memory of 3620 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 88 PID 2900 wrote to memory of 3620 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 88 PID 2900 wrote to memory of 3620 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 88 PID 2900 wrote to memory of 3620 2900 371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe 88 PID 4496 wrote to memory of 3776 4496 net.exe 91 PID 4496 wrote to memory of 3776 4496 net.exe 91 PID 4496 wrote to memory of 3776 4496 net.exe 91 PID 552 wrote to memory of 2628 552 net.exe 93 PID 552 wrote to memory of 2628 552 net.exe 93 PID 552 wrote to memory of 2628 552 net.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe"1⤵
- Modifies security service
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc2⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵PID:3776
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\371c7e630b6104c46f0fabef61271f17_JaffaCakes118.exe"2⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 4643⤵
- Program crash
PID:2024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3620 -ip 36201⤵PID:1808