Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe
-
Size
200KB
-
MD5
7150cdd8f39d8f6daca62172a1c5616d
-
SHA1
a72981bb8ebac15bb2bf8567f1ee4a3fe7185ef6
-
SHA256
ea23e1e61047167cbf36b8c3d4f8dbdfe98aff26398e25f5eb5edd6138dad1d0
-
SHA512
e2b32c23ac3b89b5e044d9093c1ebae6fd5d7c5729c542d09e82cd0e9e4b9fa37d92c0c43d2b6275770b55c9c02915bb862a2e1f493d4aeb087434cf279dbd72
-
SSDEEP
3072:XxCRlIfzpTYjHXrIIqeFqsXsKOue1u17bK20IyUjOGHatXAnpUM8ICU6ty2CKi:GIf5a7dqLAFRbByUjOBtQ+tG6ty2CN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3588-2-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3588-3-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/4824-13-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3588-15-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/516-117-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/516-118-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3588-224-0x0000000000400000-0x0000000000452000-memory.dmp upx behavioral2/memory/3588-279-0x0000000000400000-0x0000000000454000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4824 3588 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 91 PID 3588 wrote to memory of 4824 3588 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 91 PID 3588 wrote to memory of 4824 3588 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 91 PID 3588 wrote to memory of 516 3588 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 95 PID 3588 wrote to memory of 516 3588 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 95 PID 3588 wrote to memory of 516 3588 7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe startC:\Program Files (x86)\LP\CCF4\546.exe%C:\Program Files (x86)\LP\CCF42⤵
- System Location Discovery: System Language Discovery
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\7150cdd8f39d8f6daca62172a1c5616d_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\4760C\6CACC.exe%C:\Users\Admin\AppData\Roaming\4760C2⤵
- System Location Discovery: System Language Discovery
PID:516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
996B
MD514ee8820f45885d262d07aa3b1d39847
SHA1252af8c0dcb7f0dc8b986afc859ad549ff6f4e50
SHA25681461de8b7f7272676835e52d2be198a9b498860e89723b6bd28965e2fbf5803
SHA51218a871569e0ce811864f1a80db5227cef8b7c26e702fc0b4dde5fefef879fba6fe45517c16aee0a13fe458918223aa88a5d3911b0a162ea95a62f1bb584c5424
-
Filesize
600B
MD5a671c8e045bc8cffae7110350bf017d3
SHA1c388c0591eaecab33017b1a460212941eb2674cf
SHA25621303dea87f7307ee538672972fe4bff080b1141eac324801be2667f04eb46a2
SHA512f7d8e679dda86738087b844ea9e31553b6c36f457efcde854ca41ebf23ea61a0e542d97405f52a924bf76a8aaca9a355dc0a4b37563f61eae708b25adbc62fec
-
Filesize
1KB
MD55cb85157463db9d9935ee0d01fcd624d
SHA1eab57853817c6d4f4343fc6cca777d06d7710dcc
SHA256961935ac65d0a4c6c0354fd1622ce32e7553429a85b0f2fb3e6c68edd18c307e
SHA512ed8dc5ecff9a06c51f0950760636da38c8bce2e927e12f6e818acfe0f5caa36e8911fc33cac887e1e958742a404f1f532fa15b5d16b19d57b06cd8ad0f3ef16c