Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe
-
Size
204KB
-
MD5
b20fe6f1290926e4989585a17dfa286e
-
SHA1
6e836206b9620bcee980c85abae5afa88130ee99
-
SHA256
3335d095286c22f429bb55560cf8174e07691b8d665adc0aad5f7d5fd80f2f67
-
SHA512
b88ca671409c3e7f9f6a0d056f00df411de619026b6654768038091e31104176fb2fefeed709c531199f95ab64a4fe92219b39885c8abb969d4468f62990e764
-
SSDEEP
6144:EJzIRemuz3sK84zD0ccAMZtg3nlaffCYWz8n:2IRemuz3sK84v0cRk+afaYWzG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\khsfdops = "C:\\Users\\Admin\\AppData\\Local\\Temp\\crss.exe" b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2948 b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1500 2948 b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe 94 PID 2948 wrote to memory of 1500 2948 b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe 94 PID 2948 wrote to memory of 1500 2948 b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b20fe6f1290926e4989585a17dfa286e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EGUwah.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:81⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275B
MD5eb35e6f7cd04f9e11793ac38f5b0c11a
SHA19af673438bfbe0725b6e4c0436fd05cc2c83da4d
SHA256cfa2f8dacffa24e05412ef5b7b1211bfc7b64098b71a2ec3f26043a993d8d7b2
SHA512b9636d8fb499a326378be93ca826c4c8ddb7eb00f2050af569a2f8073e71baf0788d3a32427304c7a0a5e6812a23777604d9e704204a92d60b05020b221dd979
-
Filesize
204KB
MD5b20fe6f1290926e4989585a17dfa286e
SHA16e836206b9620bcee980c85abae5afa88130ee99
SHA2563335d095286c22f429bb55560cf8174e07691b8d665adc0aad5f7d5fd80f2f67
SHA512b88ca671409c3e7f9f6a0d056f00df411de619026b6654768038091e31104176fb2fefeed709c531199f95ab64a4fe92219b39885c8abb969d4468f62990e764