Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
674fc601810b0696fffa697ea180245e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
674fc601810b0696fffa697ea180245e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
674fc601810b0696fffa697ea180245e_JaffaCakes118.exe
-
Size
389KB
-
MD5
674fc601810b0696fffa697ea180245e
-
SHA1
7c6bfb489aaf5fda6648bae870740b9e2e000f80
-
SHA256
4497407c4efd9e162826c298527edf38d810d5afc46c5b3c52540b27ba4160ce
-
SHA512
e79c7742de51013d42ba675a969fd346aab87e27de8bc5e1ac270f2bdcf23c314756cdd32a652c7b75b874d5b9a617fc1f912268318b79ed3f418e5083800878
-
SSDEEP
12288:TWqOtTB1A7suqCVl+qFm3EKznJpIYdoE9KLLOTG:atTcsSO3JbdBZG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 674fc601810b0696fffa697ea180245e_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3476 ÁúÖ®¹È.exe 1436 xxxa.exe -
resource yara_rule behavioral2/files/0x0008000000023391-15.dat upx behavioral2/memory/1436-19-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5084 1436 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2264 674fc601810b0696fffa697ea180245e_JaffaCakes118.exe 2264 674fc601810b0696fffa697ea180245e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3476 ÁúÖ®¹È.exe 3476 ÁúÖ®¹È.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3476 2264 674fc601810b0696fffa697ea180245e_JaffaCakes118.exe 87 PID 2264 wrote to memory of 3476 2264 674fc601810b0696fffa697ea180245e_JaffaCakes118.exe 87 PID 2264 wrote to memory of 3476 2264 674fc601810b0696fffa697ea180245e_JaffaCakes118.exe 87 PID 2264 wrote to memory of 1436 2264 674fc601810b0696fffa697ea180245e_JaffaCakes118.exe 88 PID 2264 wrote to memory of 1436 2264 674fc601810b0696fffa697ea180245e_JaffaCakes118.exe 88 PID 2264 wrote to memory of 1436 2264 674fc601810b0696fffa697ea180245e_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\674fc601810b0696fffa697ea180245e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\674fc601810b0696fffa697ea180245e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Temp\ÁúÖ®¹È.exe"C:\Users\Admin\AppData\Local\Temp\Temp\ÁúÖ®¹È.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\Temp\xxxa.exe"C:\Users\Admin\AppData\Local\Temp\Temp\xxxa.exe"2⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 2843⤵
- Program crash
PID:5084
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1436 -ip 14361⤵PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD560ade42f0ebabf352152afe80e9b7056
SHA177c253c78bed466431a83dc43da487123c2c9b5e
SHA25695d891c1aa0322d4d961a72cb05b760dc81a30e6505d98c0936d22a7066739f4
SHA51296b9793ae2cb0053eca17f36d0e68e371aaad84df7bbf88253af4a2c58737e69815eb72167cfd4910769f8978eb8b5261171fae6354548072fe93931224cf376
-
Filesize
620KB
MD5507831ac6bc29efc34ee9fc48e683c22
SHA1fddd79e653ac105190d9c1e20e7a12a8843c75cd
SHA2560fd90c3e90013b1c444fa0a968d3b7352567b87ebb2feb4556d30efa25c763b9
SHA5121883c9f09b07e6bf150791d580cc256e5248db372c98900332b1f643e908d21f0e12c054c3eca385ef36f3235b21878630b0d1cf60a6b647377c78e94ba390de