Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe
-
Size
625KB
-
MD5
a868760c9f41960fcb5c4ef440f0c7d7
-
SHA1
1344433df901ad4ce9498d19872d16c13e495963
-
SHA256
cb2af96aeaa0228fa63550d3157cf8bf9d42e1af0d830760913adbd3f6228c6c
-
SHA512
da796193e6127ec781f0600f698e67d83f668fd8b30f48fdb68eaf442d2f2b9c3290c1976bc63f4b03fd4f2d86652e3b848736dc369aa21ed4eb0e09b6329bd5
-
SSDEEP
12288:imLvVLG8jKfvquZ7x7JYKbbavqA/U6GBmhEgE+u9WhhlMTLt00mtutpvs:imLv1G8jKfvquZ7JJYK8qA/TGBmi+u9+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4244 a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe 4244 a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4244 a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe 4244 a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a868760c9f41960fcb5c4ef440f0c7d7_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD508c4b2993c1ba977f39eed4f7baebb26
SHA1e7b8bb4c2cb9500308b33452e943a9ea525e30b6
SHA256875e11f85055497b1729d6db61b92cf4c697e829344c012777db056c0e801aa9
SHA512b2b5a820a18e1333a6e4ec729cf724aa0daa1a7ac7ccd30e2f7091a8bd5c23dc1b81efe3845f8c5432571457724069342853b7a4be7e1e3d0c3572c36f63d75f