Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 04:40
Behavioral task
behavioral1
Sample
6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe
-
Size
703KB
-
MD5
6a44b863ce6a6238896469f07fac876c
-
SHA1
8469a5f1126b21391416ac3cf6f1e75b82502510
-
SHA256
36685c46c2cd84cd3a166cac08b9308212b7aa1b337ccd1d829c374f09346238
-
SHA512
21835f5afac9ad91680c946f5020a9f1c9a9b1ed780fa1272be97c54b619b50ef342813b492c4bbcc1501d89931253a06f2f0bf905f9d3c3dc3a7723b929d152
-
SSDEEP
12288:kAYqYPBtjk+533mUSo+EAqdcth4fvwePptXJJ8yHP7XmfwWjkXrJN/m:kiY5tQ+533mUSOdcthswAtXv8yviI/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Control Panel\International\Geo\Nation udpconmain.exe -
Executes dropped EXE 4 IoCs
pid Process 1464 udpconmain.exe 3292 udpconmain.exe 2980 miner.exe 404 unzip.exe -
resource yara_rule behavioral2/memory/4760-0-0x0000000000400000-0x0000000000518000-memory.dmp upx behavioral2/memory/4760-4-0x0000000000400000-0x0000000000518000-memory.dmp upx behavioral2/files/0x000800000001e44e-12.dat upx behavioral2/memory/1464-22-0x0000000000400000-0x0000000000518000-memory.dmp upx behavioral2/memory/1464-30-0x0000000000400000-0x0000000000518000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CPU Config = "C:\\Users\\Admin\\AppData\\Local\\Temp\\udpconmain.exe" 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4760 set thread context of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 1464 set thread context of 3292 1464 udpconmain.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udpconmain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miner.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unzip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language udpconmain.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3292 udpconmain.exe 3292 udpconmain.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 4760 wrote to memory of 2592 4760 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 87 PID 2592 wrote to memory of 1464 2592 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 89 PID 2592 wrote to memory of 1464 2592 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 89 PID 2592 wrote to memory of 1464 2592 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 89 PID 2592 wrote to memory of 3708 2592 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 91 PID 2592 wrote to memory of 3708 2592 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 91 PID 2592 wrote to memory of 3708 2592 6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe 91 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 1464 wrote to memory of 3292 1464 udpconmain.exe 96 PID 3292 wrote to memory of 2980 3292 udpconmain.exe 97 PID 3292 wrote to memory of 2980 3292 udpconmain.exe 97 PID 3292 wrote to memory of 2980 3292 udpconmain.exe 97 PID 3292 wrote to memory of 404 3292 udpconmain.exe 99 PID 3292 wrote to memory of 404 3292 udpconmain.exe 99 PID 3292 wrote to memory of 404 3292 udpconmain.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a44b863ce6a6238896469f07fac876c_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\miner.exe"C:\Users\Admin\AppData\Local\Temp\miner.exe" -a 5 -o http://pit.deepbit.net:8332 -u [email protected]_1 -p matrix -t 15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\unzip.exe"C:\Users\Admin\AppData\Local\Temp\unzip.exe" payload.zip5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:404
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD5f7e8f8b995f932f4ba3361b8beb67196
SHA1708b07a1331ac623a7fdbd9587f5ca2556216f0f
SHA256a4a4963a4a705a536f52da1aa168ea0fd848dd40d8744ca4ff5f58bb0317aaa2
SHA51252d8232ce84c2ec70663e859d47a92b389e04bffaac047b2126b67e1594dde7e2a9efc69b9bfd5b91bcf8ae785869bcd1883f7d8be285ebe99d81f90f6867b11
-
Filesize
726KB
MD53b4986e5d94d0e5723eea640a6735769
SHA1eab3272d5ef1038bf3d336d2b033b813403a9ff2
SHA2568b2b026f8d00b02ff75f05cbf322e4f4b85fb609cddd93bebf17014914b90df9
SHA512efff68d4e82bf61cf7430e0673fe92f5f379ac5e52b084516d6d624097e3f767f7696f48d576dce02b03fe5976db862271db5a7b01298211913b5fa901ddb965
-
Filesize
703KB
MD56a44b863ce6a6238896469f07fac876c
SHA18469a5f1126b21391416ac3cf6f1e75b82502510
SHA25636685c46c2cd84cd3a166cac08b9308212b7aa1b337ccd1d829c374f09346238
SHA51221835f5afac9ad91680c946f5020a9f1c9a9b1ed780fa1272be97c54b619b50ef342813b492c4bbcc1501d89931253a06f2f0bf905f9d3c3dc3a7723b929d152
-
Filesize
164KB
MD575375c22c72f1beb76bea39c22a1ed68
SHA1e1652b058195db3f5f754b7ab430652ae04a50b8
SHA2568d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a
SHA5121b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a