Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe
-
Size
108KB
-
MD5
ac70ad1ea3f351140fc79d7393d08d59
-
SHA1
dbf13a35162735c7c50df0094ec38420c309c1dd
-
SHA256
cfd820c2026cae6661d785382d6d4f2ed9e5c4063e5aa5caf98eab710f188ba4
-
SHA512
15acb64b8393c52f89260f86d92ef1978ab17ea6bf2c3b2845506c8cce0b18aac5393ac107a37c6dfa79cc2b64208fd1531fb6ddbe4a521879b43cbee91c6dd8
-
SSDEEP
3072:LLjSeV2c+57XChqSlZE6kPFrgwUpJIJte4A:L6ec752lS6YL0ebex
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 396 ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3528-1-0x00000000028A0000-0x00000000038D3000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Java\jre-1.8\launch4j-tmp\ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jre-1.8\launch4j-tmp\ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3528 wrote to memory of 396 3528 ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe 87 PID 3528 wrote to memory of 396 3528 ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Program Files\Java\jre-1.8\launch4j-tmp\ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe"C:\Program Files\Java\jre-1.8\launch4j-tmp\ac70ad1ea3f351140fc79d7393d08d59_JaffaCakes118.exe" -Djava.library.path=lib -Xmx512m -classpath "lib\SweetHome3D.jar;lib\Furniture.jar;lib\Textures.jar;lib\Help.jar;lib\Loader3DS1_2u.jar;lib\iText-2.1.7.jar;lib\freehep-vectorgraphics-svg-2.1.1.jar;lib\sunflow-0.07.3f.jar;lib\jmf.jar;lib\j3dcore.jar;lib\j3dutils.jar;lib\vecmath.jar;jre6\lib\javaws.jar" com.eteks.sweethome3d.SweetHome3D2⤵
- Executes dropped EXE
PID:396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD57fb44c5bca4226d8aab7398e836807a2
SHA147128e4f8afabfde5037ed0fcaba8752c528ff52
SHA256a64ead73c06470bc5c84cfc231b0723d70d29fec7d385a268be2c590dc5eb1ef
SHA512f0bd093f054c99bcc50df4005d0190bd7e3dcefea7008ae4c9b67a29e832e02ae9ff39fa75bc1352c127aeb13afdea9bfdcc238ac826ef17f288d6fbd2ec8cab