Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe
-
Size
507KB
-
MD5
bd6d4dca49d379eb0c5f61d105fe7210
-
SHA1
cbc4453360bbbfd61e4e19cd201d20f4ea0f70fb
-
SHA256
33560a859cbb87bdd742fdcbaa62ea5346f5007c0106bb84c78fcd607a98acf3
-
SHA512
bd7da59147fbf98949f4a13949b49872387c06bce04e9dcfcf52f1b5483c8fa16e65cb038f930718a1a66f517fb1214bed9cd90fa5190824650e6d945fcc7aa3
-
SSDEEP
768:5+u501UWr+Mcpb8gYXuqAJ1Y+u4dB4puHChRT+WPq0nyiU3ktgXQ1TTGfL9:5+u503xQqvH4r+3JirQ1E9
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
griptoloji - Password:
741852
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3524 jusched.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Java\jre-08\bin\jusched.exe bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe File created C:\Program Files (x86)\Java\jre-08\bin\UF bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jusched.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe 3524 jusched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 3524 4824 bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe 88 PID 4824 wrote to memory of 3524 4824 bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe 88 PID 4824 wrote to memory of 3524 4824 bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd6d4dca49d379eb0c5f61d105fe7210_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"C:\Program Files (x86)\Java\jre-08\bin\jusched.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507KB
MD5bd6d4dca49d379eb0c5f61d105fe7210
SHA1cbc4453360bbbfd61e4e19cd201d20f4ea0f70fb
SHA25633560a859cbb87bdd742fdcbaa62ea5346f5007c0106bb84c78fcd607a98acf3
SHA512bd7da59147fbf98949f4a13949b49872387c06bce04e9dcfcf52f1b5483c8fa16e65cb038f930718a1a66f517fb1214bed9cd90fa5190824650e6d945fcc7aa3