Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe
-
Size
579KB
-
MD5
ac338442aa60da53fdd1b747e86f878b
-
SHA1
7a45af7f037bd6e30262f77f932bbb4abb89d8a0
-
SHA256
34d62d15783a6a6c73988f7b4037815bed12c9af689906aa5b8eec8d68461224
-
SHA512
149cacfaf391713baebe76183b849ed1f897c03ffbab73a62c824271a000c3a51c9e13d785a5a2593e9442be64e358c627185cd3bfc252762c86277e95e3dfd5
-
SSDEEP
12288:5hr3ZBIRiKXoYSPYNvXXn85KDWBArKEQ0WNNPgC3:51ZB2iKYYSPYRM412v7P53
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation SetA6FE.tmp -
Executes dropped EXE 2 IoCs
pid Process 3120 SetA6FE.tmp 1872 SmartInstaller.exe -
Loads dropped DLL 1 IoCs
pid Process 1872 SmartInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetA6FE.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SmartInstaller.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SmartInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SmartInstaller.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" SmartInstaller.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch SmartInstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" SmartInstaller.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Internet Explorer\IESettingSync SmartInstaller.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1872 SmartInstaller.exe 1872 SmartInstaller.exe 1872 SmartInstaller.exe 1872 SmartInstaller.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3120 4812 ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe 83 PID 4812 wrote to memory of 3120 4812 ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe 83 PID 4812 wrote to memory of 3120 4812 ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe 83 PID 3120 wrote to memory of 1872 3120 SetA6FE.tmp 87 PID 3120 wrote to memory of 1872 3120 SetA6FE.tmp 87 PID 3120 wrote to memory of 1872 3120 SetA6FE.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\SetA6FE.tmp"C:\Users\Admin\AppData\Local\Temp\SetA6FE.tmp"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\SmartInstaller.exe"C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\SmartInstaller.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
533KB
MD5f9e9a85fdc13e2a21a4c0f069d0d4376
SHA1f0c0d58f9cd31c5958a4343ddd988f03ee986d9b
SHA2566cd8051d2f833940decf9ff7c0e01f76012c97442124bd08ec8d9a4ff48fff5f
SHA512565feb4ee8e8e00e26fd50fa7c54681437bb6b1efef0f6252da2f4db01dc2eecc312cd089ce5e2720243748cbf5dab0dc2a03a7efaa0bca6c59e748b046f5802
-
Filesize
580KB
MD5f4380bce69af62428e17ca8a5cc34622
SHA167c67605f0181b2fd80fe15e37391f07efc942e5
SHA2566167539f438bef1356b94d19f212fb26cd08b543f1eb852bd670ffb65bb8ceaa
SHA512085ec4e3fc78e26db31c1f25d0049dcf1e6ea3f31ece79748b9cae100658a3b249cfde4080c35f5d4cdd0cbe0b45c1ebd28c480fc1d799e1fd3fcb25a39bdc37
-
Filesize
1KB
MD595f874ccb681582d7907b7b97eb2210c
SHA1fd7329602004f8fdf6a74937c64f84e6b7ac298e
SHA2561a88b1e058bc3cbc7e7ddffef6c8551d35dcd41bf53e9917042530c13c41d8bd
SHA512dd1595d51d51bb6513bd39c026a606b99f3042d2f38bf93bfa1e6e3d78232bc8e6b9e3b89040ef52cf369377a2a275057d74753c2af1c78150f15806f4ba226e
-
Filesize
45KB
MD5089fb82d676ca0f4f1ef633483f0d19a
SHA1bf10fee8d79b01d98972d2a49a72ff9978e1a828
SHA2569adabbc2f77a35b84df086674a202e2cee06f33257c554d41e68aa03d834f3c4
SHA51232d9f6e834dda2f6342da9fcaeaece923f7312dfe69c59d8bd71e39a94603bf8338a2866a04002b2ae07b29546114dd2da34eba91004a350bf615f636bec9110
-
Filesize
60KB
MD57e4b8ab31e8125e91afc8b77810f00b8
SHA19102137fe4c49c85dfb2270a018eae43dd8a32a7
SHA25696d61e5c017cbc4c79255a6c8cd21ce1c97159878b81332cbbf6111f6dc786db
SHA5121923916ff449c29d99023c2c98f3ede7e8f8311de779199e7eb66e8168d8714fa7e0fb443b775e92bd6ca9154d1c335d616b9d7c50455d05e4c9812fd4324282
-
Filesize
662KB
MD56d0755a10ca9230f686159c15b1fc9cb
SHA1e2c838f88669d776c5c49ae31e0ae85a8e5d66cb
SHA25602bc6db5e908b329620588fe52939be1825b2ee2fabd8ea6e95945aa9f934b34
SHA5127b77f49839107e86212e6a8c24b91f034b7242f00e9d67e913adaab061148580cf4f02d6bf768056ec064af52462c186bdef24be4a9d5db1b728d5db2beb38b7
-
Filesize
52KB
MD54965107d112666d3835308a831a29274
SHA150439b99ce525ecb74c554e1dc43ddb39481dfa4
SHA256105280995cd5746078d67b8651dfe4ad2abcd532d7ad528d3100c535b0b538af
SHA51238fa8f0eeadd75bf212eaab458833cfd3445d00f3d77f1f8a86b7c3ba99376231c8b3fc3cfdff6f02f2ca9c90956c76f9055717712d35a7ca7b30172a0010b59