Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe
-
Size
401KB
-
MD5
41e4c78af75364abed5fa07dbdec47bc
-
SHA1
c0bf4bd4047e0a6ce05d2c418b5db76733ca4aed
-
SHA256
1a63d57fa96238cc435f440193e4286f3a1f06c42c33449d4a4e0be2beb9f2a4
-
SHA512
706627032dba77f0e3614ba276d43127b32e49cfdf45f6d35121ffc72ad5de0066195d2f5e2d29e3b97a90e9f91b1253949bbfa4dd8a41d31826b0b11f54c9fa
-
SSDEEP
12288:tPc1ooHD6eF7olnHeem6FVlPi3RcOkWW1qQ:5c2lY9ePQcOW1qQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation 41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4960 ope90A7.exe 2484 ope91F0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4444 2484 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2484 ope91F0.exe 2484 ope91F0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2484 ope91F0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2932 wrote to memory of 4960 2932 41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe 86 PID 2932 wrote to memory of 4960 2932 41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe 86 PID 2932 wrote to memory of 4960 2932 41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe 86 PID 4960 wrote to memory of 1788 4960 ope90A7.exe 87 PID 4960 wrote to memory of 1788 4960 ope90A7.exe 87 PID 4960 wrote to memory of 1788 4960 ope90A7.exe 87 PID 2932 wrote to memory of 2484 2932 41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe 89 PID 2932 wrote to memory of 2484 2932 41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe 89 PID 2932 wrote to memory of 2484 2932 41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\41e4c78af75364abed5fa07dbdec47bc_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\ope90A7.exe"C:\Users\Admin\AppData\Local\Temp\ope90A7.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\b.bat "C:\Users\Admin\AppData\Local\Temp\ope90A7.exe"3⤵PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\ope91F0.exe"C:\Users\Admin\AppData\Local\Temp\ope91F0.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 4763⤵
- Program crash
PID:4444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2484 -ip 24841⤵PID:2552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57B
MD5fe65bfb88feca5d19f3b8ae10c701f5d
SHA1b19002b7de57d4a9fcc589c85a3b89e401e83552
SHA256dba301be6859924751f4ae249d9fd8930ddfba235b52ccf4848d5c29479bbc75
SHA512252efbf415dd46053e857c2280f9fb401e2b2ec6c400ab543ed11d82c987850d77de1ceeda366f72fe059e49826dfc74f5bb7f6b2a7ed3a9eab77643b5cb003d
-
Filesize
23KB
MD5c7615e295e47caf6ec98b742e3a82417
SHA10d1850dcc4bda9c31d9ca8f7ed489d3c7a6d1106
SHA256625bfc70138dcb0511a28edf7f5a75e93a241b2a4e19aabc4af0bc1ea106e122
SHA5123a9e2c3506a96750104ddbcdbbac1e831f979c6b830f61646f27c3a5201b082e481b329cca5514ed1981834ea72c090d06186bf2a7f702e04e1cc6da480037d5
-
Filesize
344KB
MD5a56cd87c2cc08c15eaea184afee93231
SHA15df424792df05e4811abdcf32344368fc04be14f
SHA256c0e329a52c93bc1c6d4f22331dee690d3f5d6358f5108db05e880bd865d0460e
SHA51284c101811809c2bd99c51df6d3b6762c02f22f44e61f0447a84aadb12a88e1262489a65234b8b007bbd6cbbd3516afefeb5ad312a4c3756a30be474804d16fe1