Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe
-
Size
415KB
-
MD5
8787ab0122b63692d45c711c62a9ae5b
-
SHA1
08775e96e366e268baef80c5f24da6f3ca2b657e
-
SHA256
858c1a15ec73430b4d1dc2f3c3fa1365ba935c4d2d03718d290f71847e352935
-
SHA512
56f375b0ef196327a9c75714ab8435a5dd49d9bec8ff7073ba487bfacb407152ace3910b6107bba5d016fb7d89615c9ef161d3b074504bc28ffa3fdcee859592
-
SSDEEP
6144:qE5WuXs2oRlewgvbhHm+UQVgz2kSnzcuxuCQWHX9VPF15FfbXuZow1C7uDZ1w+:jqZE9G+UQVgz2kSouxuRgXFdSowb1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe -
Executes dropped EXE 10 IoCs
pid Process 408 svchosty.exe 4244 svchosty.exe 1488 svchosty.exe 2336 svchosty.exe 392 svchosty.exe 1476 svchosty.exe 2252 svchosty.exe 636 svchosty.exe 2204 svchosty.exe 3576 svchosty.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosty.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 2204 svchosty.exe 2204 svchosty.exe 636 svchosty.exe 636 svchosty.exe 2252 svchosty.exe 2252 svchosty.exe 1476 svchosty.exe 1476 svchosty.exe 392 svchosty.exe 392 svchosty.exe 2336 svchosty.exe 2336 svchosty.exe 1488 svchosty.exe 1488 svchosty.exe 4244 svchosty.exe 4244 svchosty.exe 408 svchosty.exe 408 svchosty.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4868 wrote to memory of 408 4868 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 85 PID 4868 wrote to memory of 408 4868 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 85 PID 4868 wrote to memory of 408 4868 8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe 85 PID 408 wrote to memory of 4244 408 svchosty.exe 88 PID 408 wrote to memory of 4244 408 svchosty.exe 88 PID 408 wrote to memory of 4244 408 svchosty.exe 88 PID 4244 wrote to memory of 1488 4244 svchosty.exe 89 PID 4244 wrote to memory of 1488 4244 svchosty.exe 89 PID 4244 wrote to memory of 1488 4244 svchosty.exe 89 PID 1488 wrote to memory of 2336 1488 svchosty.exe 90 PID 1488 wrote to memory of 2336 1488 svchosty.exe 90 PID 1488 wrote to memory of 2336 1488 svchosty.exe 90 PID 2336 wrote to memory of 392 2336 svchosty.exe 92 PID 2336 wrote to memory of 392 2336 svchosty.exe 92 PID 2336 wrote to memory of 392 2336 svchosty.exe 92 PID 392 wrote to memory of 1476 392 svchosty.exe 93 PID 392 wrote to memory of 1476 392 svchosty.exe 93 PID 392 wrote to memory of 1476 392 svchosty.exe 93 PID 1476 wrote to memory of 2252 1476 svchosty.exe 94 PID 1476 wrote to memory of 2252 1476 svchosty.exe 94 PID 1476 wrote to memory of 2252 1476 svchosty.exe 94 PID 2252 wrote to memory of 636 2252 svchosty.exe 95 PID 2252 wrote to memory of 636 2252 svchosty.exe 95 PID 2252 wrote to memory of 636 2252 svchosty.exe 95 PID 636 wrote to memory of 2204 636 svchosty.exe 96 PID 636 wrote to memory of 2204 636 svchosty.exe 96 PID 636 wrote to memory of 2204 636 svchosty.exe 96 PID 2204 wrote to memory of 3576 2204 svchosty.exe 97 PID 2204 wrote to memory of 3576 2204 svchosty.exe 97 PID 2204 wrote to memory of 3576 2204 svchosty.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exe"C:\Users\Admin\AppData\Local\Temp\svchosty.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\svchosty.exeC:\Users\Admin\AppData\Local\Temp\svchosty.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3576
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a66b149a7ebc798955373415d683f32a
SHA115ceaba8cfae8368600620ae97aa26ae7331d626
SHA256036c94653e84e6078c087abeb3ac8804491d27b27938839ae3df42b31e2238d9
SHA512286add411911651ed9217ab94b286d4e3fb546f4bf39c451eff86df0b6daab412d2fd97e0e34c4b71322e862eddf8bc1efdb9d7e1e3c53c15bb420f609966443
-
Filesize
295KB
MD583ae2790b4528531046b9903361af5c6
SHA1ff01b966dfa8d41fb18fd1af36e5fd92b5d44838
SHA25657eb9423f455c973371def560c38bd6fe3c936680c408181574ba452c989febf
SHA5128c665f58596ebcb7821976ca65b20b98bf435ee63ad3424804b3ab764b90ae5c82a5307fb34f7329de0f567155c37d919c79af545b4480c48428bdd81e25132a