Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe
-
Size
129KB
-
MD5
a6601396632bad6bd3aa07b7258426ed
-
SHA1
f866a1fcef43fa20b05f21cae9862aac2f3e57d7
-
SHA256
410c9c7bde0827f0b59ae71b87efa4826484575ed12e4b3904b1d22df18d6de4
-
SHA512
22c7f685da05d6f36171c88837473bcb3b829abc02e2e8f76ac105c85acefd2c25f402e6f34b979d2d70927fc86cc845d5db4f73c34aa181fca50c627add8eb3
-
SSDEEP
3072:s6K4roryHyyPpuSRvBPNEO51d3fKqKs9mUqOmFBf9jjD2F4Pe:s6wr0u2BP551lCqpmUZmf126
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2256 Vtamya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe File created C:\Windows\Vtamya.exe a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe File opened for modification C:\Windows\Vtamya.exe a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Vtamya.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Vtamya.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vtamya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main Vtamya.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\International Vtamya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe 2256 Vtamya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2256 2488 a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe 87 PID 2488 wrote to memory of 2256 2488 a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe 87 PID 2488 wrote to memory of 2256 2488 a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6601396632bad6bd3aa07b7258426ed_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\Vtamya.exeC:\Windows\Vtamya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390B
MD5cbc3e27c193cdd1f30df50a2cccc62d5
SHA1b5592d4970a75f28a474423cd33173f3803777c8
SHA2563bb23b3130e7c088d32adbb8104f5bf2490e27720270d2e782009c60c827de20
SHA51216124241a3080db4374557e92ed8a493f543ad3117b97b26e659be0b52f9444f8fafc45f6351d3e3c85ae4ee4aa1e8507afe1b827b3b07126c097e1f4ddc975e
-
Filesize
129KB
MD5a6601396632bad6bd3aa07b7258426ed
SHA1f866a1fcef43fa20b05f21cae9862aac2f3e57d7
SHA256410c9c7bde0827f0b59ae71b87efa4826484575ed12e4b3904b1d22df18d6de4
SHA51222c7f685da05d6f36171c88837473bcb3b829abc02e2e8f76ac105c85acefd2c25f402e6f34b979d2d70927fc86cc845d5db4f73c34aa181fca50c627add8eb3