Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe
-
Size
480KB
-
MD5
a6be847129d1cdb525b5a3ba114f18b4
-
SHA1
cceb30b640ad51b1f8b2266827661a42a8ee432e
-
SHA256
a6e67b7690d7334c610176aa961840a2f80eb678e2fed2c4a6c5a7e9cd3f4155
-
SHA512
f58861f24c650505e70992bafceb64a9c16177d68a8dd88d496a8cd5be4a2e60ec95d22864d1e169d48bf1141c892774e7e77fb552e3456869d34a1f1f686db2
-
SSDEEP
6144:dajvIDIUlI+0Qd/VCr2U1QaMjAlm2yMm0CAvEEw0IlaNFKGbH1XOOAlv:dII/QgVCr2UiaMjA7yMm04Ewnhv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4140 svohst.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svohst.exe a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe File created C:\Windows\SysWOW64\svohst.exe svohst.exe File created C:\Windows\SysWOW64\Deleteme.bat svohst.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svohst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4140 wrote to memory of 1508 4140 svohst.exe 91 PID 4140 wrote to memory of 1508 4140 svohst.exe 91 PID 4140 wrote to memory of 1508 4140 svohst.exe 91 PID 1976 wrote to memory of 2160 1976 a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe 94 PID 1976 wrote to memory of 2160 1976 a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe 94 PID 1976 wrote to memory of 2160 1976 a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a6be847129d1cdb525b5a3ba114f18b4_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
C:\Windows\SysWOW64\svohst.exeC:\Windows\SysWOW64\svohst.exe -NetSata1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵
- System Location Discovery: System Language Discovery
PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104B
MD52eec7e3ae21b6acc8fb8cf0a2f7323aa
SHA10e6a8a87b7c2848ffec860a6955a44a2c166ad9b
SHA25678d9742426f406d30f8379f240e595b8ab937b48bc9b0b5099e7e9ecfaa9fac2
SHA512e13fae2b008a4eb4b88ade4e516d8c8d2521c1c88b53fd4f62863673ade296e708c5b128f1b5b79b18d78f0ed3c94a892207841b664c057a2617ab97aa8bf281
-
Filesize
212B
MD5c609f2e97c3b37bee494720d590961da
SHA1d2b53d184d52d13b58df0f4cb6173ef5dc945a81
SHA25633e797ced36fc8a33c46d134cd791af171eab92f005d5904b19006ae699577a1
SHA51248603f604ecd0116f5ac14aea239f18cce28efb4ec1e6411ccfd451c5c783f4cf32a5b5cd6469054cfde7da56b54497c2e187f415c41ba8f1e1d040588a2e38f
-
Filesize
480KB
MD5a6be847129d1cdb525b5a3ba114f18b4
SHA1cceb30b640ad51b1f8b2266827661a42a8ee432e
SHA256a6e67b7690d7334c610176aa961840a2f80eb678e2fed2c4a6c5a7e9cd3f4155
SHA512f58861f24c650505e70992bafceb64a9c16177d68a8dd88d496a8cd5be4a2e60ec95d22864d1e169d48bf1141c892774e7e77fb552e3456869d34a1f1f686db2