Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe
-
Size
1004KB
-
MD5
5efad1214adc1dd30c01b5bafa6c43ff
-
SHA1
96f3d842dbc1b79ab26066dbe6a4ca22e28835b3
-
SHA256
da670f8507f5960d02a803149cbd6bf7802ba4ed1d3b6e4d848069bdcb8c0c3b
-
SHA512
af6768f8738852bc6fa69d84edd487f033147498b174a4ef176e36a94a902376719a50b12ea914ab329b8731a597a08ee2a48cbe8bdddd4cd7f0c3a9e2d486c6
-
SSDEEP
24576:CPRiXSNP7UvbpNgv03znCJ+N7JoRq2WQ0GBuxOFl/NQ:CP8XCQuQnCAtlGBuxOF4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1864 dessin.exe 2664 dessin.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1864 set thread context of 2664 1864 dessin.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4080 2664 WerFault.exe 89 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1864 1712 5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe 86 PID 1712 wrote to memory of 1864 1712 5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe 86 PID 1712 wrote to memory of 1864 1712 5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe 86 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89 PID 1864 wrote to memory of 2664 1864 dessin.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5efad1214adc1dd30c01b5bafa6c43ff_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\dessin.exe"C:\dessin.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\dessin.exeC:\dessin.exe3⤵
- Executes dropped EXE
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 6084⤵
- Program crash
PID:4080
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2664 -ip 26641⤵PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5ff4f1d64104b165816e5c8a7f681ad15
SHA11c5efc9ae5da283fff082b41263e612b42eb6104
SHA256e13f3ed451142707830eb5c7edc8574b5f04f7870f03a51b49f1a3ef3ec099e7
SHA5126a9aad6a03f056e5566654c51eb68720d6ac69cb4caff76eb063172becf91afb74249c7fe0bf08b1b1f4b4957801175e4aef5c1ecc9cfc546c1584fa74129d30