Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe
-
Size
506KB
-
MD5
83b744fff7a7a6794ab64e9bfc92fbf1
-
SHA1
5dfc766f49f300e8a54f9637202d04bf0258ee07
-
SHA256
32310f8497cc7ea01a3f0e0d1e9003a909266af44c21a25e5679ae7b4e930aac
-
SHA512
569926f09094b7f54d8561593bf7c483196db1b7ec56f0fcadf3da3e07499acf3e93aa24b7b2eb02e5884beb3d593af2d90f13d8a297ad4dc5b2cf01173a4971
-
SSDEEP
6144:nrCtWgCKtYlCKepTrPj/47maIowyzAtnlGszEmAIto95w1NVdUlDdv3ferQPuVEm:nr1g3tYQhdy0olz2GsCv9PtfecPuo+n
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4172 µØϳÇÓëÓÂÊ¿_2019.exe 1448 Á¬·¢³ÌÐò.exe -
resource yara_rule behavioral2/files/0x000a000000023451-5.dat upx behavioral2/memory/4172-11-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/4172-23-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2812 4172 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language µØϳÇÓëÓÂÊ¿_2019.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Á¬·¢³ÌÐò.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1448 Á¬·¢³ÌÐò.exe 1448 Á¬·¢³ÌÐò.exe 1448 Á¬·¢³ÌÐò.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1448 Á¬·¢³ÌÐò.exe 1448 Á¬·¢³ÌÐò.exe 1448 Á¬·¢³ÌÐò.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1448 Á¬·¢³ÌÐò.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 404 wrote to memory of 4172 404 83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe 84 PID 404 wrote to memory of 4172 404 83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe 84 PID 404 wrote to memory of 4172 404 83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe 84 PID 404 wrote to memory of 1448 404 83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe 87 PID 404 wrote to memory of 1448 404 83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe 87 PID 404 wrote to memory of 1448 404 83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\83b744fff7a7a6794ab64e9bfc92fbf1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\µØϳÇÓëÓÂÊ¿_2019.exe"C:\Users\Admin\AppData\Local\Temp\µØϳÇÓëÓÂÊ¿_2019.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 2923⤵
- Program crash
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Á¬·¢³ÌÐò.exe"C:\Users\Admin\AppData\Local\Temp\Á¬·¢³ÌÐò.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4172 -ip 41721⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5c451c4246bd99194696269fd025def92
SHA1967643ae1b29ac353094d2f481cfc0a1b43bfcad
SHA2566fc79b459310675e0f130eb0ff30ddae3c57e3ef13130e02709f93c0ce0a34f7
SHA512b291165cda34bc11fc68ae2149776848f291ab1c48797633b2afff14b9b818c5567e0aa3a0ef189fe9de38d6c01dda015938f401e2a6f554710748cff3a74210
-
Filesize
440KB
MD5faf7406d995c71dedb4bf826fa4222d2
SHA12417f848e5c2def1a5d9135b5267c71145611dda
SHA2563b20513a150afbf53735bbaabebb0d7426adef6f174eb56d0fff135e285a3915
SHA512e066ccbb3519a0937ed297f9b9c9eb97cb91c9081686fdfdff04d6d42509b1615942d36d3c268a0d154ce1f66b2c4f107063c07087f570f81af8f4aed22ccbd4