Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
7414195f40555e41659f46399e6368e1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7414195f40555e41659f46399e6368e1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7414195f40555e41659f46399e6368e1_JaffaCakes118.exe
-
Size
15KB
-
MD5
7414195f40555e41659f46399e6368e1
-
SHA1
519ba935c1d454ba4e75804d507ad10f48408a8d
-
SHA256
9ead0f018f36b74089aeb744169e5f2bc04e522fcc005e291bedf3c57f48cb66
-
SHA512
df38f01dc61a1099a9f2d7952059375a764b1704dba16d1334c24cf6479d1e2c4f581c41b556c84c665613afe22127e63e74bf566cf7dc8edb21eda369625134
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYKB2HE:hDXWipuE+K3/SSHgxmKEk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation DEM4358.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 7414195f40555e41659f46399e6368e1_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation DEME714.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation DEM3EF8.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation DEM95E2.exe Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation DEMEC8E.exe -
Executes dropped EXE 6 IoCs
pid Process 4152 DEME714.exe 1568 DEM3EF8.exe 1528 DEM95E2.exe 776 DEMEC8E.exe 544 DEM4358.exe 2544 DEM9A81.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7414195f40555e41659f46399e6368e1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEME714.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM3EF8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM95E2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMEC8E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM4358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM9A81.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2924 wrote to memory of 4152 2924 7414195f40555e41659f46399e6368e1_JaffaCakes118.exe 96 PID 2924 wrote to memory of 4152 2924 7414195f40555e41659f46399e6368e1_JaffaCakes118.exe 96 PID 2924 wrote to memory of 4152 2924 7414195f40555e41659f46399e6368e1_JaffaCakes118.exe 96 PID 4152 wrote to memory of 1568 4152 DEME714.exe 101 PID 4152 wrote to memory of 1568 4152 DEME714.exe 101 PID 4152 wrote to memory of 1568 4152 DEME714.exe 101 PID 1568 wrote to memory of 1528 1568 DEM3EF8.exe 103 PID 1568 wrote to memory of 1528 1568 DEM3EF8.exe 103 PID 1568 wrote to memory of 1528 1568 DEM3EF8.exe 103 PID 1528 wrote to memory of 776 1528 DEM95E2.exe 106 PID 1528 wrote to memory of 776 1528 DEM95E2.exe 106 PID 1528 wrote to memory of 776 1528 DEM95E2.exe 106 PID 776 wrote to memory of 544 776 DEMEC8E.exe 114 PID 776 wrote to memory of 544 776 DEMEC8E.exe 114 PID 776 wrote to memory of 544 776 DEMEC8E.exe 114 PID 544 wrote to memory of 2544 544 DEM4358.exe 116 PID 544 wrote to memory of 2544 544 DEM4358.exe 116 PID 544 wrote to memory of 2544 544 DEM4358.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\7414195f40555e41659f46399e6368e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7414195f40555e41659f46399e6368e1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\DEME714.exe"C:\Users\Admin\AppData\Local\Temp\DEME714.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\DEM3EF8.exe"C:\Users\Admin\AppData\Local\Temp\DEM3EF8.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\DEM95E2.exe"C:\Users\Admin\AppData\Local\Temp\DEM95E2.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\DEMEC8E.exe"C:\Users\Admin\AppData\Local\Temp\DEMEC8E.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\DEM4358.exe"C:\Users\Admin\AppData\Local\Temp\DEM4358.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\DEM9A81.exe"C:\Users\Admin\AppData\Local\Temp\DEM9A81.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD59db2003e2e59a7c3fe67f59fb4207d8a
SHA1f23be6077970c36bae63798136357d46be53fece
SHA2562dddf6b23b92c00cf89c609f8cea50c2e5627413216cb85e42cec2f33040600c
SHA512e674337a9a8728370cc7be957b6874e9585c291a6ee3a5b26bdb8cd34af92af832bfd07f63423bbc0d9414a2cbd94013b8309406874ca71f9a87879a47b77493
-
Filesize
15KB
MD59175bd0e4b73c8b8231996a9f2606d38
SHA17c20278751454e466df7c4690f2e50ad39e766c8
SHA2569aac67990ef03652a0f8748643d3097e29c90cb7f337d8f3b8665cda94649061
SHA512e51018e42aa01575ce83891014e7a38796f444e6bf796336de09b2da1a9ffc3d52a05139ab68037996a42c9545a2b275b4c99b353bdf1e912ba6e175e2e1720e
-
Filesize
15KB
MD5d12600c90a482e50dcae12e2eae51da0
SHA1775ec3fe41822104ac9b1de63643e414166ca138
SHA25630f9105159b7dd84bdd43b44019b228e2e95c02b27507921d462b7abe5571cd1
SHA512b5e2c4f3c15805224b02a388dacb7850ff399e1e362325b0770b9a49ed7a22fb4c4e99caeb7ebfa6f3f60d518a295f459e63c156db69320e8195e7a652c71304
-
Filesize
15KB
MD5bc1a6939e95171a35e764aefba853873
SHA1e75238e4ed5b35cfa21265950d6fd64c127bb881
SHA25676a9dc4a60d5ef86413492117a972a498b9a96840e859ef6bdd767aabec53412
SHA512d04670b79fa283f13bc022d8be97995be88a166c99ecfdca8cc7f61bff1e754a14bd2d60074cf673fc8cf23afdf903ddbe43eb9c04abbce3d52efec7bb852185
-
Filesize
15KB
MD5760ae74fcd7f6538bc570bd97d7de1de
SHA1fcae7a0dafdf9c5dee323d917194a0d04075505c
SHA256d43fb84f7e42cc45a98c372a3373324c4570bcdc3402be1dc2a75a3d3d93ef53
SHA5120b54ae0ad4597f12fdef93feef2ad0340cb8d9bced910b9db60917d343346158258afc31e1df40116c86e19608f54ced3ce6c0b44537a9b1b6f5e52c4d056588
-
Filesize
15KB
MD5e5eb619da7e50e2976832ab01769c426
SHA1c969e5d96b400264101f97d54c9cfbf5eb442144
SHA256032ed2ec0e9f0b3976df89ee714d71384db25b556ef59b084a8fb85dab2354de
SHA51286454cfb5f2498f4c3e536246b057037cf7ac2a0b9ef41c9a2260125507ede83a9f268352eb46cd4b87a78639c8c3a7b11b4b01e5dc17710697f0ce09501fea5