Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe
-
Size
156KB
-
MD5
8a3e998833fd8b0185b5152b0a68b93b
-
SHA1
66e23b39b748452a81f6f81b0846b19dd29e3049
-
SHA256
47fb6c735ea41d70c4a9a806f85abf6ce68d49faf2059fc284ee270f3333bbb9
-
SHA512
f6fd173ef7098e6cd1ca59de45e9b7b1aab4e85ed5fd59a5b162726068a732a63d931a33fa2dcc9cbf10be694b5db76c93300bdcdc9f7ab0353dd589c656759c
-
SSDEEP
3072:FJKjp4Hg29j1MDNXBEmhxAxTohTMg7yFGlKkTJrcDuG:qogGxMDNxxhaaimKl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 768 Triria.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\TBXQRHV4KR = "C:\\Windows\\Triria.exe" Triria.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Triria.exe 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe File created C:\Windows\Triria.exe 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Triria.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Triria.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main Triria.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International Triria.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe 768 Triria.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2604 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe 768 Triria.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 768 2604 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe 31 PID 2604 wrote to memory of 768 2604 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe 31 PID 2604 wrote to memory of 768 2604 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe 31 PID 2604 wrote to memory of 768 2604 8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8a3e998833fd8b0185b5152b0a68b93b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\Triria.exeC:\Windows\Triria.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD5d9a045b027c3ac2bd6f5b962687f875c
SHA1f69e8a9df394c7fcc577ef76ab11eb1a6a93fb11
SHA2566131a1e71fd6d980030d40cf0dd3858d0f90e133c102a549aedf17d03a9f097f
SHA512dd639f82a14ea3e55fb2c81756028ab87cbb6faea0a4cb40e70d1c2adfe34e267bc91e1e67b59efb48bcfff82e65ab3154ab32aeede74add05d6903a13485213
-
Filesize
156KB
MD58a3e998833fd8b0185b5152b0a68b93b
SHA166e23b39b748452a81f6f81b0846b19dd29e3049
SHA25647fb6c735ea41d70c4a9a806f85abf6ce68d49faf2059fc284ee270f3333bbb9
SHA512f6fd173ef7098e6cd1ca59de45e9b7b1aab4e85ed5fd59a5b162726068a732a63d931a33fa2dcc9cbf10be694b5db76c93300bdcdc9f7ab0353dd589c656759c