Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe
-
Size
40KB
-
MD5
0101cfbdfc4ba6957dfcf324b1680a88
-
SHA1
f8a35961a7d5e73ca625952c65ed3a4fc0d34e9f
-
SHA256
15352163a10cf8605443b7e1ebd8b488690b85fddf1a63d18591c2a216e5d528
-
SHA512
bb8fb9039f6dcf21e57932787823646b7ebca6bfb4d84377d0a54d63076eb5d88b08fc350ff26963e2840ed8a42bc91fee5b93f349d7266753ad8703d02a17b5
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRkoG:nSgy19JSVO1ONn511/tivXZzOmRk1
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 4792 pvpvd.exe 5096 ppddd.exe 3000 bhttbh.exe 4980 bnbtbn.exe 2940 xlfllxf.exe 4932 vpvvd.exe 2516 dppvp.exe 3208 pjpvv.exe 2348 3bbttn.exe 1636 frxrlll.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dppvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhttbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbtbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlfllxf.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3136 wrote to memory of 4792 3136 0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe 131 PID 3136 wrote to memory of 4792 3136 0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe 131 PID 3136 wrote to memory of 4792 3136 0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe 131 PID 4792 wrote to memory of 5096 4792 pvpvd.exe 88 PID 4792 wrote to memory of 5096 4792 pvpvd.exe 88 PID 4792 wrote to memory of 5096 4792 pvpvd.exe 88 PID 5096 wrote to memory of 3000 5096 ppddd.exe 89 PID 5096 wrote to memory of 3000 5096 ppddd.exe 89 PID 5096 wrote to memory of 3000 5096 ppddd.exe 89 PID 3000 wrote to memory of 4980 3000 bhttbh.exe 90 PID 3000 wrote to memory of 4980 3000 bhttbh.exe 90 PID 3000 wrote to memory of 4980 3000 bhttbh.exe 90 PID 4980 wrote to memory of 2940 4980 bnbtbn.exe 91 PID 4980 wrote to memory of 2940 4980 bnbtbn.exe 91 PID 4980 wrote to memory of 2940 4980 bnbtbn.exe 91 PID 2940 wrote to memory of 4932 2940 xlfllxf.exe 92 PID 2940 wrote to memory of 4932 2940 xlfllxf.exe 92 PID 2940 wrote to memory of 4932 2940 xlfllxf.exe 92 PID 4932 wrote to memory of 2516 4932 vpvvd.exe 93 PID 4932 wrote to memory of 2516 4932 vpvvd.exe 93 PID 4932 wrote to memory of 2516 4932 vpvvd.exe 93 PID 2516 wrote to memory of 3208 2516 dppvp.exe 139 PID 2516 wrote to memory of 3208 2516 dppvp.exe 139 PID 2516 wrote to memory of 3208 2516 dppvp.exe 139 PID 3208 wrote to memory of 2348 3208 pjpvv.exe 95 PID 3208 wrote to memory of 2348 3208 pjpvv.exe 95 PID 3208 wrote to memory of 2348 3208 pjpvv.exe 95 PID 2348 wrote to memory of 1636 2348 3bbttn.exe 188 PID 2348 wrote to memory of 1636 2348 3bbttn.exe 188 PID 2348 wrote to memory of 1636 2348 3bbttn.exe 188
Processes
-
C:\Users\Admin\AppData\Local\Temp\0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
\??\c:\pvpvd.exec:\pvpvd.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4792 -
\??\c:\ppddd.exec:\ppddd.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
\??\c:\bhttbh.exec:\bhttbh.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\bnbtbn.exec:\bnbtbn.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\xlfllxf.exec:\xlfllxf.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\vpvvd.exec:\vpvvd.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
\??\c:\dppvp.exec:\dppvp.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\pjpvv.exec:\pjpvv.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
\??\c:\3bbttn.exec:\3bbttn.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\frxrlll.exec:\frxrlll.exe11⤵
- Executes dropped EXE
PID:1636 -
\??\c:\pdjjd.exec:\pdjjd.exe12⤵PID:1748
-
\??\c:\jdpvj.exec:\jdpvj.exe13⤵PID:3240
-
\??\c:\7xlrfxf.exec:\7xlrfxf.exe14⤵PID:4776
-
\??\c:\5jpjd.exec:\5jpjd.exe15⤵PID:3020
-
\??\c:\bbbttb.exec:\bbbttb.exe16⤵PID:3616
-
\??\c:\5jpdd.exec:\5jpdd.exe17⤵PID:816
-
\??\c:\9bbtnn.exec:\9bbtnn.exe18⤵PID:884
-
\??\c:\lrlrxll.exec:\lrlrxll.exe19⤵PID:1864
-
\??\c:\bhnhbn.exec:\bhnhbn.exe20⤵PID:2900
-
\??\c:\lfrrrxx.exec:\lfrrrxx.exe21⤵PID:4716
-
\??\c:\jvdpp.exec:\jvdpp.exe22⤵PID:1880
-
\??\c:\frxxlff.exec:\frxxlff.exe23⤵PID:4864
-
\??\c:\jvdjd.exec:\jvdjd.exe24⤵PID:4712
-
\??\c:\bhttnt.exec:\bhttnt.exe25⤵PID:1720
-
\??\c:\xxxrlll.exec:\xxxrlll.exe26⤵PID:2604
-
\??\c:\vdvvj.exec:\vdvvj.exe27⤵PID:3776
-
\??\c:\fllfxlf.exec:\fllfxlf.exe28⤵PID:1240
-
\??\c:\rxlrflx.exec:\rxlrflx.exe29⤵PID:4244
-
\??\c:\lxffxff.exec:\lxffxff.exe30⤵PID:5000
-
\??\c:\7vpjp.exec:\7vpjp.exe31⤵PID:1212
-
\??\c:\bhbtnn.exec:\bhbtnn.exe32⤵PID:3224
-
\??\c:\jdjpj.exec:\jdjpj.exe33⤵PID:4076
-
\??\c:\tnhbhb.exec:\tnhbhb.exe34⤵PID:376
-
\??\c:\5vpjv.exec:\5vpjv.exe35⤵PID:4292
-
\??\c:\jvvjj.exec:\jvvjj.exe36⤵PID:5032
-
\??\c:\vppjp.exec:\vppjp.exe37⤵PID:1172
-
\??\c:\pjvpp.exec:\pjvpp.exe38⤵PID:5012
-
\??\c:\ddvdd.exec:\ddvdd.exe39⤵PID:1384
-
\??\c:\7xfxllf.exec:\7xfxllf.exe40⤵PID:5016
-
\??\c:\ntnnhh.exec:\ntnnhh.exe41⤵PID:3692
-
\??\c:\5rrffff.exec:\5rrffff.exe42⤵PID:224
-
\??\c:\nhhbtb.exec:\nhhbtb.exe43⤵PID:1648
-
\??\c:\hbbbbh.exec:\hbbbbh.exe44⤵PID:3384
-
\??\c:\lrfxflf.exec:\lrfxflf.exe45⤵PID:1904
-
\??\c:\dvjdj.exec:\dvjdj.exe46⤵PID:3544
-
\??\c:\ddpjj.exec:\ddpjj.exe47⤵PID:3208
-
\??\c:\pjpjj.exec:\pjpjj.exe48⤵PID:2524
-
\??\c:\xfrxrrl.exec:\xfrxrrl.exe49⤵PID:3168
-
\??\c:\xrllfll.exec:\xrllfll.exe50⤵PID:2956
-
\??\c:\llfxfrx.exec:\llfxfrx.exe51⤵PID:3332
-
\??\c:\1djdd.exec:\1djdd.exe52⤵PID:3432
-
\??\c:\hhbbtb.exec:\hhbbtb.exe53⤵PID:4776
-
\??\c:\xlllrff.exec:\xlllrff.exe54⤵PID:4568
-
\??\c:\vjvvv.exec:\vjvvv.exe55⤵PID:1960
-
\??\c:\5jjdd.exec:\5jjdd.exe56⤵PID:1036
-
\??\c:\7nthtt.exec:\7nthtt.exe57⤵PID:3128
-
\??\c:\5bhhhn.exec:\5bhhhn.exe58⤵PID:4700
-
\??\c:\nhnnnt.exec:\nhnnnt.exe59⤵PID:3120
-
\??\c:\dpjvd.exec:\dpjvd.exe60⤵PID:916
-
\??\c:\thhhbh.exec:\thhhbh.exe61⤵PID:2900
-
\??\c:\rlxxfff.exec:\rlxxfff.exe62⤵PID:4048
-
\??\c:\dpjjd.exec:\dpjjd.exe63⤵PID:1764
-
\??\c:\xrfllrr.exec:\xrfllrr.exe64⤵PID:508
-
\??\c:\hbnnbh.exec:\hbnnbh.exe65⤵PID:3252
-
\??\c:\ddjjp.exec:\ddjjp.exe66⤵PID:2912
-
\??\c:\xxfrfrl.exec:\xxfrfrl.exe67⤵PID:2244
-
\??\c:\rfxxlrx.exec:\rfxxlrx.exe68⤵PID:116
-
\??\c:\xrffxxl.exec:\xrffxxl.exe69⤵PID:372
-
\??\c:\5pppp.exec:\5pppp.exe70⤵PID:2208
-
\??\c:\tthbbh.exec:\tthbbh.exe71⤵PID:3908
-
\??\c:\bbhtbh.exec:\bbhtbh.exe72⤵PID:700
-
\??\c:\7thbtt.exec:\7thbtt.exe73⤵PID:1908
-
\??\c:\nbttnn.exec:\nbttnn.exe74⤵PID:4484
-
\??\c:\ttnhhh.exec:\ttnhhh.exe75⤵PID:4832
-
\??\c:\nbbbhh.exec:\nbbbhh.exe76⤵PID:4560
-
\??\c:\tnnhnb.exec:\tnnhnb.exe77⤵PID:964
-
\??\c:\frxrrxr.exec:\frxrrxr.exe78⤵PID:3456
-
\??\c:\9frfffx.exec:\9frfffx.exe79⤵PID:4312
-
\??\c:\tbbtbn.exec:\tbbtbn.exe80⤵PID:544
-
\??\c:\hhbhnb.exec:\hhbhnb.exe81⤵PID:4872
-
\??\c:\9lxxxrr.exec:\9lxxxrr.exe82⤵PID:4292
-
\??\c:\rrlrfxx.exec:\rrlrfxx.exe83⤵PID:5032
-
\??\c:\ttbbbh.exec:\ttbbbh.exe84⤵PID:2352
-
\??\c:\hnntth.exec:\hnntth.exe85⤵PID:5080
-
\??\c:\hbnntb.exec:\hbnntb.exe86⤵PID:1384
-
\??\c:\xrlrrrx.exec:\xrlrrrx.exe87⤵PID:5016
-
\??\c:\pjvpp.exec:\pjvpp.exe88⤵PID:3880
-
\??\c:\dvjpv.exec:\dvjpv.exe89⤵PID:224
-
\??\c:\bhnhhb.exec:\bhnhhb.exe90⤵PID:1420
-
\??\c:\djvpv.exec:\djvpv.exe91⤵PID:4368
-
\??\c:\jvvpp.exec:\jvvpp.exe92⤵PID:3488
-
\??\c:\hbtbnh.exec:\hbtbnh.exe93⤵PID:3480
-
\??\c:\thnbtn.exec:\thnbtn.exe94⤵PID:1124
-
\??\c:\jvppv.exec:\jvppv.exe95⤵PID:3728
-
\??\c:\vvvjv.exec:\vvvjv.exe96⤵PID:1636
-
\??\c:\jjppj.exec:\jjppj.exe97⤵PID:3724
-
\??\c:\thhbtb.exec:\thhbtb.exe98⤵PID:4204
-
\??\c:\tbhhbh.exec:\tbhhbh.exe99⤵PID:1956
-
\??\c:\fxlllrx.exec:\fxlllrx.exe100⤵PID:4564
-
\??\c:\rxxfllx.exec:\rxxfllx.exe101⤵PID:3552
-
\??\c:\5djpp.exec:\5djpp.exe102⤵PID:1140
-
\??\c:\hbhnhn.exec:\hbhnhn.exe103⤵PID:3020
-
\??\c:\xflfrfl.exec:\xflfrfl.exe104⤵PID:4356
-
\??\c:\xllfrfr.exec:\xllfrfr.exe105⤵PID:3616
-
\??\c:\pppjv.exec:\pppjv.exe106⤵PID:3152
-
\??\c:\dpdpd.exec:\dpdpd.exe107⤵PID:2152
-
\??\c:\ddjpp.exec:\ddjpp.exe108⤵PID:628
-
\??\c:\xxlllxr.exec:\xxlllxr.exe109⤵PID:2504
-
\??\c:\xlxfrlr.exec:\xlxfrlr.exe110⤵PID:3760
-
\??\c:\hnttnh.exec:\hnttnh.exe111⤵PID:2836
-
\??\c:\jdjdj.exec:\jdjdj.exe112⤵PID:4976
-
\??\c:\9xflxxx.exec:\9xflxxx.exe113⤵PID:4316
-
\??\c:\3dddd.exec:\3dddd.exe114⤵PID:4712
-
\??\c:\pvvvp.exec:\pvvvp.exe115⤵PID:4816
-
\??\c:\vpjvv.exec:\vpjvv.exe116⤵PID:1740
-
\??\c:\pjpjj.exec:\pjpjj.exe117⤵PID:4852
-
\??\c:\pdvpp.exec:\pdvpp.exe118⤵PID:4696
-
\??\c:\nhhbnn.exec:\nhhbnn.exe119⤵PID:4284
-
\??\c:\bthnnt.exec:\bthnnt.exe120⤵PID:4224
-
\??\c:\ttttnn.exec:\ttttnn.exe121⤵PID:1216
-
\??\c:\fxfflrr.exec:\fxfflrr.exe122⤵PID:3292
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-