Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe
-
Size
106KB
-
MD5
3d471a83ed7c39a7c1c6c30f542f690c
-
SHA1
0095881939a2373587992c8630da1ccbc5cd5061
-
SHA256
7fc57190388ab4a4454026b364d9a58a3ed0a193282500542a09984c12002532
-
SHA512
f7550e10d7069b057ca6518dc040c8ddbe5edd6680325c615051d33464535b36bc69318dc85aee7a161f9afd57305abe8163b9dc5fabba8b7d941a4d5934a542
-
SSDEEP
768:ovAbpyCVU4NGMMD3016VY1q/miAK7TubFBCLmRdnukufMZg+sddagY8WL:oIdfgD3//zTACWZuDEZPseMWL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 5056 explore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5056 explore.exe 5056 explore.exe 5056 explore.exe 5056 explore.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4204 wrote to memory of 5056 4204 3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe 86 PID 4204 wrote to memory of 5056 4204 3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe 86 PID 4204 wrote to memory of 5056 4204 3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe 86 PID 5056 wrote to memory of 3516 5056 explore.exe 56 PID 5056 wrote to memory of 3516 5056 explore.exe 56 PID 5056 wrote to memory of 3516 5056 explore.exe 56 PID 5056 wrote to memory of 3516 5056 explore.exe 56 PID 5056 wrote to memory of 3516 5056 explore.exe 56 PID 5056 wrote to memory of 3516 5056 explore.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d471a83ed7c39a7c1c6c30f542f690c_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\explore.exe"C:\Users\Admin\AppData\Local\Temp\explore.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD53b176b217b93eac55225db0d258e7978
SHA1cffe9297e90eadca5f13b6be894fa92f36112120
SHA25621548c95754b64596917376fa61dce24519d6532342708aef4c5359d9f53f44a
SHA51263a01c711e0dda23c78cbf4fd912b6b0d95c55bbdb9d2dc84533252263de8fed8a25e5f04917d2023d80a45618ac867fd42130d35dbdf197851f5924ed674223