Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
82245542bb175ce1a563edcd990825df_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82245542bb175ce1a563edcd990825df_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
82245542bb175ce1a563edcd990825df_JaffaCakes118.exe
-
Size
333KB
-
MD5
82245542bb175ce1a563edcd990825df
-
SHA1
ebc0edbc42cea698a7ef1a962bae234b03262059
-
SHA256
5f3c47f1baa95980e6e30bdd98a55c05b53d3cffa055320ccc8683b95b276bf3
-
SHA512
8014519d7d14739988417ce9e9d02bed5c4c63e21898919c89f49582e111e02be7debc48c7f7e2dfd8fd2b39c664423201f2ce5694e06be9f780947ed95b888c
-
SSDEEP
6144:fdddQZbZKxgka/p65VIkgnjBj6aurMeXeUd7uloiIv0B:fnaZKxIw3063MWeUFuG/k
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2468 set thread context of 2704 2468 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2704 2468 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe 86 PID 2468 wrote to memory of 2704 2468 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe 86 PID 2468 wrote to memory of 2704 2468 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe 86 PID 2468 wrote to memory of 2704 2468 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe 86 PID 2468 wrote to memory of 2704 2468 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe 86 PID 2468 wrote to memory of 2704 2468 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe 86 PID 2468 wrote to memory of 2704 2468 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe 86 PID 2468 wrote to memory of 2704 2468 82245542bb175ce1a563edcd990825df_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\82245542bb175ce1a563edcd990825df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82245542bb175ce1a563edcd990825df_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\82245542bb175ce1a563edcd990825df_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82245542bb175ce1a563edcd990825df_JaffaCakes118.exe"2⤵PID:2704
-