Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe
-
Size
360KB
-
MD5
a7de19222210d70a95e981b9ab493287
-
SHA1
ee004a5e194cdb8c5c1437ad47b30e639d0c12e0
-
SHA256
0392986105c63ddd27be3a9cb51b8be56585c2263f696daf32705428465315ff
-
SHA512
537a3325b0b86508691db1c1fd220348aeca53fc70da41eac152ff6ee91cd031d4d43fad8e3625ea38304cccad217753c8477de21d8dab191f9d7f882b9ba27c
-
SSDEEP
6144:zWQ7ett5F2idZecnl20lHRxp3gFg6BeIdCoDd+jEheFrB9p/n1ivuQ7B+RO:zWQ7erF3Z4mxx51Icoo4e9BuIRO
Malware Config
Signatures
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\nbjs.dll a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nbjs.dll a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe File created C:\Windows\SysWOW64\1.hiv a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3548 set thread context of 544 3548 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 544 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe Token: SeRestorePrivilege 544 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe Token: SeRestorePrivilege 544 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe Token: SeRestorePrivilege 544 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe Token: SeRestorePrivilege 544 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe Token: SeRestorePrivilege 544 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3548 wrote to memory of 544 3548 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe 85 PID 3548 wrote to memory of 544 3548 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe 85 PID 3548 wrote to memory of 544 3548 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe 85 PID 3548 wrote to memory of 544 3548 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe 85 PID 3548 wrote to memory of 544 3548 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe 85 PID 544 wrote to memory of 4352 544 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe 87 PID 544 wrote to memory of 4352 544 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe 87 PID 544 wrote to memory of 4352 544 a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\a7de19222210d70a95e981b9ab493287_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a7de19222210d70a95e981b9ab493287_JaffaCakes118.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c nbjs2008.bat3⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a6c89f60cb708a3d3ee841e387711c36
SHA1deb26a7f0d0dc2e0a9f4b8f698277d21936faba4
SHA2561bd2d93d1dc9158fb87f77f6d4d95d9e92987fa0d5200be426b97301f5fe7598
SHA5126d677c57c429e634bca15e7039ba28558675dd279da5ba35789c976ee6001f1ce65a4f56a343be050c5b7bb87c18b3fd40bad311a1e536abe3b3d9f2ffcf4ed9