Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 05:37
Behavioral task
behavioral1
Sample
6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe
-
Size
435KB
-
MD5
6a6b495f81ec7e18f4f086fea33af8ae
-
SHA1
524b1eae3da6c2748844f5a3cc8f469222f49fd8
-
SHA256
4011ee02574209afc705256b036a87d0f4d31061cc537bc9077a79e40c8a3df5
-
SHA512
41a953c4b403dc858f0a899ebd55835e92548816f90ef43f8197f68a856e18f0644aebce5845030385ba6fbdaa87fd0bb31bf68b2c83b1eb365a669f1d670fe7
-
SSDEEP
6144:R5zCDsPq5rnNr0/jCwkKdK7CrjtLGuDAsSJITlWXA2oBFoSgZ44MM2UExGB6iLst:HalbNgewpuCI7JikXA2oDoSO/8G0EmDj
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2248-0-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-1-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-2-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-3-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-4-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-5-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-6-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-7-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-8-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-9-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-10-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-11-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-12-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-13-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-14-0x0000000000400000-0x00000000004ED000-memory.dmp upx behavioral2/memory/2248-15-0x0000000000400000-0x00000000004ED000-memory.dmp upx -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2248-1-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-2-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-3-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-4-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-5-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-6-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-7-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-8-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-9-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-10-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-11-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-12-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-13-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-14-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe behavioral2/memory/2248-15-0x0000000000400000-0x00000000004ED000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2248 6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6a6b495f81ec7e18f4f086fea33af8ae_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2248