Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe
-
Size
622KB
-
MD5
a6b45b90f856e7b0bb79a168695d9b85
-
SHA1
b6ad7fd046ba9ef98bce187b4cb61666b59e17c0
-
SHA256
0e9824181765f707189c228bd331536a5dc2ad0022290875bc9716e9b1725fbe
-
SHA512
95c932d2e53399275956fbe400fad8f23b3e50083cd9e6e3af920a93510ab82a80cfbcea46701dedbd37d89f36d17e6cd0c3a53df3f74a5f8ae93cbf5565dca2
-
SSDEEP
12288:cZ1k/9kymKKimWkyNKDu7JYi0QnhAJ+IvHY0DtXt4x2KVsyB6I+jvpfq:Q1e9UKKimLyNKDgJYrvJrvHY0wx2Keyd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3660 a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe 3660 a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3660 a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe 3660 a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6b45b90f856e7b0bb79a168695d9b85_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD52511eaeb2a44840faf705db3b7486b7e
SHA17e773fcfc5c3faa31e53a449891c4b647f193768
SHA25691d737999bad40f3664a7c39a6af744a3b00d471a65020fcc2e45e39714f43bb
SHA51260c16600c3de688450ed7e47088729ef8b2fa3794a8a57eeb3a6a0b0674044a4eb73d97c22a64ec1a4b1c4ff0bd971d0c149ffeb8e84899cc828b2b181fd583f