Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 07:23
Static task
static1
Behavioral task
behavioral1
Sample
aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe
-
Size
135KB
-
MD5
aa1b908b00254f7ed9b55b3a517b7e46
-
SHA1
853922e63ececca0fa5ebccbb078cdeca101d6b3
-
SHA256
bb1ae5292dda08b25e46019710e48e74796e9085916a5768045703548d20c87b
-
SHA512
fa283286adb7e7e021c836896d43efcc2561b54dd7838b373f7ddfbf8575073c68430c2cdcb88444393ae1823b7995eaa928241fd7fa6e45d6ed93b786c6a57e
-
SSDEEP
3072:Rr+pMQQfahmYP3fzo3qYQ0VPQRDMgfXXjnKK+pnq8f5rRpBdBanOout:RrKuSmaSxVPQDM4nzKKCnq8fTdBaOoS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3808 proxysvc32.exe -
Executes dropped EXE 1 IoCs
pid Process 3808 proxysvc32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\proxysvc32.exe aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\proxysvc32.exe aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\proxysvc32.exe proxysvc32.exe File created C:\Windows\SysWOW64\proxysvc32.exe proxysvc32.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language proxysvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2872 wrote to memory of 3808 2872 aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe 84 PID 2872 wrote to memory of 3808 2872 aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe 84 PID 2872 wrote to memory of 3808 2872 aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe 84 PID 3808 wrote to memory of 2460 3808 proxysvc32.exe 96 PID 3808 wrote to memory of 2460 3808 proxysvc32.exe 96 PID 3808 wrote to memory of 2460 3808 proxysvc32.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\proxysvc32.exeC:\Windows\system32\proxysvc32.exe 1140 "C:\Users\Admin\AppData\Local\Temp\aa1b908b00254f7ed9b55b3a517b7e46_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\del.bat C:\Windows\SysWOW64\proxysvc32.exe3⤵
- System Location Discovery: System Language Discovery
PID:2460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136B
MD5bfcf9cc6d1c37953dfa43312e2c36140
SHA107a4c0f29b282c34be24c312c4b920e479f4cee0
SHA256bac7cce52aeba3a2e2ce2bb6aebf50ffa65530d0d51ca49a2abc7f4e43ce3ce5
SHA512fb661474557e7168d4050607863b57649fa12a26ab9bd06078ae3254d003d76cfed4eac3d0a78a56eaf0ecc5b231d52788b6c8688cb14b0c86a37efe90f5f53a
-
Filesize
135KB
MD5aa1b908b00254f7ed9b55b3a517b7e46
SHA1853922e63ececca0fa5ebccbb078cdeca101d6b3
SHA256bb1ae5292dda08b25e46019710e48e74796e9085916a5768045703548d20c87b
SHA512fa283286adb7e7e021c836896d43efcc2561b54dd7838b373f7ddfbf8575073c68430c2cdcb88444393ae1823b7995eaa928241fd7fa6e45d6ed93b786c6a57e