Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
3s -
platform
windows10-2004_x64 -
resource
win10v2004-20240729-en -
resource tags
arch:x64arch:x86image:win10v2004-20240729-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 10:01 UTC
Static task
static1
Behavioral task
behavioral1
Sample
77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe
Resource
win10v2004-20240729-en
Errors
General
-
Target
77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe
-
Size
20KB
-
MD5
77c5926ee5d55e427ef100d9861f784c
-
SHA1
e3c112a4a2217d0efb836de73f067442a4f40967
-
SHA256
122e0727a8fa54dd69820b8262754c2125c3d4e2458fd71bc4413743a7b71662
-
SHA512
cf7ea7567524a0c26b51125ab52dae2c3c057d8320783b871185ab07760eb867a5f175d224b90f00a736298dcb35621e58a3715f7da114bfb2b9fef7884ad5ff
-
SSDEEP
96:etJE33kf8J4UncxuWqCYqBddnl9SEvVc4MV9yVmEi2:KwPdIqeBR99rS9yPi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-735441492-2964205366-2526932795-1000\Control Panel\International\Geo\Nation 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3512 wrote to memory of 3856 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 84 PID 3512 wrote to memory of 3856 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 84 PID 3512 wrote to memory of 3856 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 84 PID 3512 wrote to memory of 2476 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 86 PID 3512 wrote to memory of 2476 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 86 PID 3512 wrote to memory of 2476 3512 77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe 86 PID 3856 wrote to memory of 2996 3856 cmd.exe 88 PID 3856 wrote to memory of 2996 3856 cmd.exe 88 PID 3856 wrote to memory of 2996 3856 cmd.exe 88 PID 2476 wrote to memory of 4012 2476 cmd.exe 90 PID 2476 wrote to memory of 4012 2476 cmd.exe 90 PID 2476 wrote to memory of 4012 2476 cmd.exe 90 PID 2996 wrote to memory of 3584 2996 net.exe 89 PID 2996 wrote to memory of 3584 2996 net.exe 89 PID 2996 wrote to memory of 3584 2996 net.exe 89 PID 4012 wrote to memory of 536 4012 net.exe 91 PID 4012 wrote to memory of 536 4012 net.exe 91 PID 4012 wrote to memory of 536 4012 net.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77c5926ee5d55e427ef100d9861f784c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop sharedaccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess4⤵
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop KAVStart2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\net.exenet stop KAVStart3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVStart4⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
-
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A13.107.21.237dual-a-0034.a-msedge.netIN A204.79.197.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=1B3AC026A2736CFD21E4D4EAA3936D6E; domain=.bing.com; expires=Sun, 24-Aug-2025 08:21:40 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F4D66459E7FB4E919C51DFF91F130C3C Ref B: LON04EDGE1007 Ref C: 2024-07-30T08:21:40Z
date: Tue, 30 Jul 2024 08:21:40 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1B3AC026A2736CFD21E4D4EAA3936D6E
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=1R9Xkkrfz2SFzD9DOBYCQLh0gW7VWxUA70SdFCgl6I8; domain=.bing.com; expires=Sun, 24-Aug-2025 08:21:41 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F46DD18B972D49F0894AEE6477A8CADE Ref B: LON04EDGE1007 Ref C: 2024-07-30T08:21:41Z
date: Tue, 30 Jul 2024 08:21:40 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid=Remote address:13.107.21.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=1B3AC026A2736CFD21E4D4EAA3936D6E; MSPTC=1R9Xkkrfz2SFzD9DOBYCQLh0gW7VWxUA70SdFCgl6I8
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 5CF7055B95FA44F088EDF9873B1F157E Ref B: LON04EDGE1007 Ref C: 2024-07-30T08:21:41Z
date: Tue, 30 Jul 2024 08:21:40 GMT
-
Remote address:8.8.8.8:53Request134.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.21.107.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
13.107.21.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid=tls, http22.4kB 9.2kB 20 15
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=d37260a5eb1e428e9ce859bc2b1ad6f4&localId=w:BC80AFB7-E6E1-07B6-705F-E96FCE29F2A7&deviceId=6755468454491161&anid=HTTP Response
204
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
13.107.21.237204.79.197.237
-
72 B 158 B 1 1
DNS Request
134.32.126.40.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
237.21.107.13.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa