Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe
-
Size
451KB
-
MD5
b95260ca625d1bb82ef2d1f7ca51e09b
-
SHA1
78d5c95c0081c38fbf3d441c27a182a9f073856c
-
SHA256
b5a9b6f676e260674c8b11969abe247c73ae5b412e15dbe0c7f5cf8201adf539
-
SHA512
d22a5eee4eb97e7826a6e36db4e5d31f5843951b6d792b81ad9eedf92ba04a41e593e9c7a34ae045439d60d34339ce16a4cd84f3bcd006d2fd57ad775882a8be
-
SSDEEP
6144:qIQ85f7R5X/6K66A+7ZlZNRH4C/rWnU01oa+ByquI/gBg8LOqM6r4dqiXHE:T5f95SEA+9vPYYKSUqBsg8LOqNUdqiU
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023409-4.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 2884 b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe 2884 b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x0008000000023409-4.dat upx behavioral2/memory/2884-9-0x00000000005A0000-0x00000000005B3000-memory.dmp upx behavioral2/memory/2884-10-0x00000000005A0000-0x00000000005B3000-memory.dmp upx behavioral2/memory/2884-11-0x00000000005A0000-0x00000000005B3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hkey current user = "C:\\Windows\\widos.exe" b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\FinDriv.dll b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\FinDriv.dll b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\widos.exe b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe File created C:\Windows\widos.exe b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2884 b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe 2884 b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b95260ca625d1bb82ef2d1f7ca51e09b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5036bf1ad1943f038d03f45502262b5e0
SHA1997410a5972d3e2ea6fea72a8fe0fb65d1bfd89e
SHA2563c59a230f852ea61a46b668fc7be5a7f804c25fb2b4d3d6529d473faeb6b8ad8
SHA512d4b90ddf30513c700835cdd4e6f95c066073eda25fc680f6984deb632f1b3208e755ee85dd951b77c9e89905cb6921f0648456ff0bf6a1d6699a0bcaa1d9988a