Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe
-
Size
182KB
-
MD5
72d6a7fc04157865e34d0b1ce59418fd
-
SHA1
b81128ff98e03fc03bd0bd583ef4b3d1a5d334ae
-
SHA256
5aabd5c248a0a2802bf93c5de050306a18cd606bd5ba871752ce299273447c99
-
SHA512
2ab117b6d49a43d61bfcaa1c9d0259fcac94d0d1494830911a8b8c46aca3a64c5bcf216370887f001b5323c3535135afbf73be65bbf4423f3db1b8fdc9b5d4fa
-
SSDEEP
3072:XMmidb7kHp3jSIPr8ZSLsousgjMNkYp8jY/+thH:/iZQJzSg8S4+gjpO4Y/qhH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1164 keygen.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4508 4668 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keygen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4668 72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe 4668 72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe 4668 72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe 4668 72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4668 wrote to memory of 1176 4668 72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe 90 PID 4668 wrote to memory of 1176 4668 72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe 90 PID 4668 wrote to memory of 1176 4668 72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe 90 PID 1176 wrote to memory of 1164 1176 cmd.exe 92 PID 1176 wrote to memory of 1164 1176 cmd.exe 92 PID 1176 wrote to memory of 1164 1176 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 2242⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~88A8.bat "C:\Users\Admin\AppData\Local\Temp\72d6a7fc04157865e34d0b1ce59418fd_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\keygen.exeC:\Users\Admin\AppData\Local\keygen.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4668 -ip 46681⤵PID:4196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
807B
MD5cd9c38158babb9ba179fb9542b7c5db6
SHA1451329cf3997c947b94faac7ec3d411caed3cd5c
SHA256c192d151dadf3e5f1e8983fec04b0e0336ec890893f86ff27960f833dadd3abc
SHA512d9ef7209af7b0fc9582d8a87d82824966b3564747d0a874d4e49b83eacd0c6d5abdd092b6ac34b48fcf07fb4f048027b63d8fbb097706ed4b86900235c7582f0
-
Filesize
133KB
MD519168e1dde8e0f15a8cfdaa05c0cdb63
SHA19d7a9a4de304a19e482795349813568b071ff573
SHA2560045ec5cbadd1d21e44acfae093c117bc92ea436f23126dc88eb0f2f772de3c5
SHA512f229e6a6c509476c7b2ab74c5dcb34ec2046d7e6b0d158a9128e9b2faf05dd486d558cc9adf0627c2177003820b28eb6c819d5aa872b3beba311968d3fd1802b