Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe
-
Size
301KB
-
MD5
a2e138f736c1dc019614455093d43a86
-
SHA1
44c11c9597383dd81c5bf1af2fcd453962f862d0
-
SHA256
8655a619d48d872a17bdc6df80976d0bc52d3c1edb59633bd1cb2e56adb65245
-
SHA512
60e7e9d2b600390086e8379b96d188e7ac9f95c8c8230c4570402dd67240f5f60f38ed2ad7dedab1ce945a5494a82c87952b5b1ed1e124ee2b97ca405a92992f
-
SSDEEP
6144:fJEYERqaQiEYixXAkmOgoUpMEEdlntRb5A+na4S3lfEQwf:h5+qntJxjfg5mxdltZ5A+na4TQwf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5116 svohst.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\svohst.exe a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svohst.exe a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohst.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5116 wrote to memory of 1332 5116 svohst.exe 89 PID 5116 wrote to memory of 1332 5116 svohst.exe 89 PID 5116 wrote to memory of 1332 5116 svohst.exe 89 PID 5068 wrote to memory of 2880 5068 a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe 93 PID 5068 wrote to memory of 2880 5068 a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe 93 PID 5068 wrote to memory of 2880 5068 a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a2e138f736c1dc019614455093d43a86_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\SysWOW64\svohst.exe -NetSata1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104B
MD52eec7e3ae21b6acc8fb8cf0a2f7323aa
SHA10e6a8a87b7c2848ffec860a6955a44a2c166ad9b
SHA25678d9742426f406d30f8379f240e595b8ab937b48bc9b0b5099e7e9ecfaa9fac2
SHA512e13fae2b008a4eb4b88ade4e516d8c8d2521c1c88b53fd4f62863673ade296e708c5b128f1b5b79b18d78f0ed3c94a892207841b664c057a2617ab97aa8bf281
-
Filesize
212B
MD5124b51c7c7dafa1f8e4ac41b11135c62
SHA1a8931400948a771178707e6ee1d5c350c105f0f8
SHA256accb57cc39b788af7ccb8bac5879364b48858a84ba0151d717d9bdddf98023ae
SHA512081ea21c6edf5ea5b77e87031bd42f8761fd7bb27eca76279e6d42865cc16a95a667b24782ae643485e580cb0c945f0ad7ad82ff97c3302a05c238d32cf26f6f
-
Filesize
301KB
MD5a2e138f736c1dc019614455093d43a86
SHA144c11c9597383dd81c5bf1af2fcd453962f862d0
SHA2568655a619d48d872a17bdc6df80976d0bc52d3c1edb59633bd1cb2e56adb65245
SHA51260e7e9d2b600390086e8379b96d188e7ac9f95c8c8230c4570402dd67240f5f60f38ed2ad7dedab1ce945a5494a82c87952b5b1ed1e124ee2b97ca405a92992f