Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 07:22
Behavioral task
behavioral1
Sample
9521ed86f41f8d0be42cfa708f948bc3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9521ed86f41f8d0be42cfa708f948bc3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9521ed86f41f8d0be42cfa708f948bc3_JaffaCakes118.exe
-
Size
66KB
-
MD5
9521ed86f41f8d0be42cfa708f948bc3
-
SHA1
421014a09c877b84b99b4d65b1c57e62fc34cdec
-
SHA256
d7f36135d46c7e6d524be5560593835d0a5cb71c5616e512b6948f5d376f34b0
-
SHA512
351cda80849222a5523d5d433859f406a477311975584563fbbed59b2c308d3d092246ad2ca8914716d8bfde89cac9501be8e1d92417be6d62b4c2c570062fd6
-
SSDEEP
1536:OCUBsCkKNP+xRLDLdQ7YKEFRgBz9nY5gGdcMqu:OCUBsGPWLm7YKETgBzq5gkl
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/792-1-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/792-3-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/792-2-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svchost240623578 = "C:\\Windows\\svchost.exe" 9521ed86f41f8d0be42cfa708f948bc3_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 9521ed86f41f8d0be42cfa708f948bc3_JaffaCakes118.exe File opened for modification C:\Windows\svchost.exe 9521ed86f41f8d0be42cfa708f948bc3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9521ed86f41f8d0be42cfa708f948bc3_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9521ed86f41f8d0be42cfa708f948bc3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9521ed86f41f8d0be42cfa708f948bc3_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:792