Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
8ee244ad6b6f2b814d34d26dae880f12
-
SHA1
5988431f4a18ae89ce22d540b2872c3b349a3eba
-
SHA256
c8e432a8271910e909e3b6dce20ad368fa02a8c76d7abc9e9452c0d9227f6129
-
SHA512
b308229665359a5b5328706c927c3ce3a670a21f2d71f4fdedaead1028424ac53ec3e2edacd3aa942080877b66251ee631d328eb334dddfb90ce8cdb9a6223ec
-
SSDEEP
49152:aXUWJPtNZIN7F4R0NKISULOvjwwx6ts8F1ba3qVg0iMupcXreomUla8WfEtzgSs/:apA4UKZXvjwwxb8F1ba3sg0ryZUlalfB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4500 Center240630046.dat -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Center240630046.dat -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4720 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 4720 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4500 4720 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 84 PID 4720 wrote to memory of 4500 4720 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 84 PID 4720 wrote to memory of 4500 4720 8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8ee244ad6b6f2b814d34d26dae880f12_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\Center240630046.dat"C:\Users\Admin\AppData\Local\Temp\Center240630046.dat"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD55d04457e3d4026a82ac3ec9b1c0819ec
SHA1f7d9a0e3f08239ca5113c5e109f5b602b4c97db3
SHA2564778938b911bec8ad1a9059b79ac0cc6bafddee2389c4c2b9297d47ecb8c2215
SHA512a97bf4e99cb1626c75b9752093feb053eba2b4fa36aed2920f16194627056f74e9fff517aa139d9c74e1de9b9c3df88118591d174e021552e010fba860f72f12