Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe
-
Size
150KB
-
MD5
bd909029ecacae1f6b66104674d11e54
-
SHA1
55857a93812c235fcefffc957a3b3214dc064fbf
-
SHA256
41a0807c907d982c101830ff96495b367fb2aa3a96f413f4a42cda6f1965bb94
-
SHA512
f8462cba91d897651790b9244198c2dc139338c4f651ed7064a3b38d8bb654669fea6728282174e7aa470cdcca60b03873e4901b59af825cbcee3b2a6d7dd519
-
SSDEEP
3072:BJr4QJ4QB2xuNmraT74butfkchrl29FOBPIB9:jrTB24iUcchyIm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3688 Windefend.exe 720 Windefend.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Windefend.exe bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Windefend.exe bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3680 set thread context of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 1708 set thread context of 908 1708 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 102 PID 3688 set thread context of 720 3688 Windefend.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windefend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windefend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 3688 Windefend.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3680 wrote to memory of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 3680 wrote to memory of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 3680 wrote to memory of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 3680 wrote to memory of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 3680 wrote to memory of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 3680 wrote to memory of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 3680 wrote to memory of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 3680 wrote to memory of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 3680 wrote to memory of 1708 3680 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 96 PID 1708 wrote to memory of 908 1708 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 102 PID 1708 wrote to memory of 908 1708 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 102 PID 1708 wrote to memory of 908 1708 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 102 PID 1708 wrote to memory of 908 1708 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 102 PID 1708 wrote to memory of 908 1708 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 102 PID 1708 wrote to memory of 908 1708 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 102 PID 1708 wrote to memory of 908 1708 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 102 PID 908 wrote to memory of 3688 908 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 104 PID 908 wrote to memory of 3688 908 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 104 PID 908 wrote to memory of 3688 908 bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe 104 PID 3688 wrote to memory of 720 3688 Windefend.exe 112 PID 3688 wrote to memory of 720 3688 Windefend.exe 112 PID 3688 wrote to memory of 720 3688 Windefend.exe 112 PID 3688 wrote to memory of 720 3688 Windefend.exe 112 PID 3688 wrote to memory of 720 3688 Windefend.exe 112 PID 3688 wrote to memory of 720 3688 Windefend.exe 112 PID 3688 wrote to memory of 720 3688 Windefend.exe 112 PID 3688 wrote to memory of 720 3688 Windefend.exe 112 PID 3688 wrote to memory of 720 3688 Windefend.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe3⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\Windefend.exe"C:\Windows\system32\Windefend.exe" rem "C:\Users\Admin\AppData\Local\Temp\bd909029ecacae1f6b66104674d11e54_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\Windefend.exeC:\Windows\SysWOW64\Windefend.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:720
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD5bd909029ecacae1f6b66104674d11e54
SHA155857a93812c235fcefffc957a3b3214dc064fbf
SHA25641a0807c907d982c101830ff96495b367fb2aa3a96f413f4a42cda6f1965bb94
SHA512f8462cba91d897651790b9244198c2dc139338c4f651ed7064a3b38d8bb654669fea6728282174e7aa470cdcca60b03873e4901b59af825cbcee3b2a6d7dd519