Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe
-
Size
178KB
-
MD5
a35e2d30db8c6f69798ed3ebd78a60e5
-
SHA1
d8d814b892d58f2ec58e343d570cbc3f8808b5d9
-
SHA256
47bf70a9a7b5799a8763fbc9941fee8fc785a9b84567f9834df8153e53a76eaf
-
SHA512
ae36eb90d40df2b69dcdb98d8309f3286edde91b1652fa4db730d87b8914ef527a4de69a9d59caf9669d4d0e486e942747644a8f82038872c089329576b75ded
-
SSDEEP
3072:u0Gox2PD7tC6PNMk/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPJWqGU/n6CbzGcBIMHIGl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5068 Qpafoa.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Qpafoa.exe a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe File opened for modification C:\Windows\Qpafoa.exe a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Qpafoa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Qpafoa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qpafoa.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\Main Qpafoa.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Software\Microsoft\Internet Explorer\International Qpafoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe 5068 Qpafoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3968 wrote to memory of 5068 3968 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 89 PID 3968 wrote to memory of 5068 3968 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 89 PID 3968 wrote to memory of 5068 3968 a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a35e2d30db8c6f69798ed3ebd78a60e5_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\Qpafoa.exeC:\Windows\Qpafoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD5a35e2d30db8c6f69798ed3ebd78a60e5
SHA1d8d814b892d58f2ec58e343d570cbc3f8808b5d9
SHA25647bf70a9a7b5799a8763fbc9941fee8fc785a9b84567f9834df8153e53a76eaf
SHA512ae36eb90d40df2b69dcdb98d8309f3286edde91b1652fa4db730d87b8914ef527a4de69a9d59caf9669d4d0e486e942747644a8f82038872c089329576b75ded
-
Filesize
390B
MD50b3a00f7391756ced932689a328c28f3
SHA10924954d8507e8e285e9742d66f97416923a68c4
SHA256534055940c374de52e45192b906952659fbf0a62a2401d2272df90441e0009ca
SHA5126e69199fd767630ee405b5fa9ab3ba4405cf11f48a0247a08fbf9fadcd281aadb2881a531e2492a77020753bbddfe3e95e6f0c0aa4f60206af2e4f14eb933ba1