Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe
-
Size
136KB
-
MD5
b798cac7d0969a6369cc0c8d2b3ea169
-
SHA1
0ea8e3fe9dd9f9d3c2605288ad2fbec104555c7b
-
SHA256
c50f512d6dc79915f3f73f0c951641fa1d7e521b62b38ef5fb54af77e2b15e66
-
SHA512
a7aeec6e2d4fa8e5e9cbe8bf28b24c6d8f1f06e2bd21f9bc180683fec3655bfad485cbeeb2a1a514045a57d5079cadc0735524de00a1f28bc6b1c2b7a78b7061
-
SSDEEP
768:j/5inm+cd5rHemPXkqUEphjVuvios1rPr4adL0NqlJMU60+ppQ1TTGfLB:jRsvcdcQjosnvnZ6LQ1EB
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4856 jusched.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-09\bin\jusched.exe b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Java\jre-09\bin\jusched.exe b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-09\bin\UF b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe 4856 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4856 3924 b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe 88 PID 3924 wrote to memory of 4856 3924 b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe 88 PID 3924 wrote to memory of 4856 3924 b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b798cac7d0969a6369cc0c8d2b3ea169_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"C:\Program Files (x86)\Java\jre-09\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5930f7f12436dd4fea33286c16d939560
SHA19620d56aa7fe1242a30cfd838d5da08557e6aa3e
SHA256b8930d3b112625f0c775d911b4327f70f4ee8d3f15cbf60c6b8e307b0b7bcdfa
SHA5126aff268ab470044473b70470d9d4f9dc16f7f741acf88acbef2c9fc2c8724e5140240ff79dd7c9491bcf3c6a76c657b9f7d69d7369dfb84e9ea67fb552fb8653