Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe
-
Size
6.5MB
-
MD5
bc4d0ad6d35b5f7696aaa117265815da
-
SHA1
f3b021f45f1e54e5826579dc797d9d3004d2fb4a
-
SHA256
7896cbbec89f6f79883a877a25aceeb9c6f0401601ffd1411c0849b150c661b4
-
SHA512
b732f02b5ebdba430805cdbad99df628221027657aaef80bc2c290aca7ef881e67292d0afdb7d6b697774484757868f69e898a02451e6bc5a41d9963172a1c8f
-
SSDEEP
196608:lLAjOEDzxiTh4vJSSZkU0STmtiamai/aH4pW:lLAKko4zDPai/k4pW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 2560 maincheacker.exe 1472 maincheacker.exe 3360 start.exe -
Loads dropped DLL 13 IoCs
pid Process 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe 1472 maincheacker.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 discord.com 14 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.ipify.org 11 api.ipify.org -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023446-6.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 392 3360 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2560 4868 bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe 86 PID 4868 wrote to memory of 2560 4868 bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe 86 PID 2560 wrote to memory of 1472 2560 maincheacker.exe 90 PID 2560 wrote to memory of 1472 2560 maincheacker.exe 90 PID 4868 wrote to memory of 3360 4868 bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe 91 PID 4868 wrote to memory of 3360 4868 bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe 91 PID 4868 wrote to memory of 3360 4868 bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bc4d0ad6d35b5f7696aaa117265815da_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\maincheacker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\maincheacker.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\maincheacker.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\maincheacker.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 8243⤵
- Program crash
PID:392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3360 -ip 33601⤵PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.4MB
MD5a23e6706583a6dda6e53f89f191314b3
SHA1b7dc911bbe3e382b78fe4eb963eeb4b95c2b8919
SHA256cde0fed5b1d9ed88172900284e6603b959d28c74818142dd59397804ac368745
SHA51241ca11a3cad297061efecb392e2e04c41db47a22db7027968ed2737e342194fb7342d5aaf3ed9aada417c97261bfa671f140b1e4eeee73fd54674e4b893ca9b2
-
Filesize
24KB
MD55b4ff415e917a4bd650dfa998741f31b
SHA1012aa727ab67ef103f2276cf6571b04035863ce2
SHA2567ad280d630cd23d8e1bf071323ac5cd35bc389f1fc3f7c5aae147a3e5983d635
SHA512266187d4eb6a424e11c1ae689c0bc56c649a19d6b4592b3df14108d15f15c06c6e843001e3e0e08108853443db02d26654eaadf8a53f1dc39c89c18c7ad5355f
-
Filesize
91KB
MD57942be5474a095f673582997ae3054f1
SHA1e982f6ebc74d31153ba9738741a7eec03a9fa5e8
SHA2568ee6b49830436ff3bec9ba89213395427b5535813930489f118721fd3d2d942c
SHA51249fbc9d441362b65a8d78b73d4fdcf988f22d38a35a36a233fcd54e99e95e29b804be7eabe2b174188c7860ebb34f701e13ed216f954886a285bed7127619039
-
Filesize
85KB
MD56fd0281bca7eee0f354a91f958714edb
SHA1c7f643955d589f6d3093459327dcaab3b7ae4a32
SHA25603d8966f4d8ab347140a3ad9938fb91db11e01e028e980721451070eb0483cf7
SHA51286b2944acac0601273a7534b5698991ed0475cc3f913f179fad27aa8cb7732ea56d9e70b6e959fb55795384ed652565586b8a10474864daa4874321f31b4a416
-
Filesize
124KB
MD5da2ff1686ab85c37a2a247bb8595c258
SHA12168b91cd87f89f9a5590775bd6610eabc5d4cb7
SHA256279560b61e20b869a059a103fb010093f9e367420bc81182646e357de8b9740f
SHA5127711cb3a8302af491be5a33923032be4633400ee5c5d65937307f8c5e14674f0f32c96569e77fe894728a9f4dba1fbc43a984e8bd262721b0f8949d8f7bb93f3
-
Filesize
46KB
MD53400da54faf3c3128f9c9e126a881be0
SHA16352074113ecb5b5ecf0442d70898f2acb933e91
SHA25668913d6d5102d32dddf5a21a4770ac2791f29106c0d2d3a3d0192356ea366c66
SHA512d9d9ca6a27792af60e36fab9d623bcdd9727efd565cd8c3787da70f10e168ded90d9208f9c9c56a5815ab316779dc05dc799fbf8e327c9ef18765c6c529886c4
-
Filesize
160KB
MD50caa4da7b74fc8e8f08ba736274bdb46
SHA14b46dc22c81fa3558537249c994614def1fd8cce
SHA256167c5550b93541c703c8afeb4d912719d5039230a7efce8f4bc500f175252ed8
SHA51247f1f338ea4055a4b88691ebb511ee95d29943aa7d519a7d5f513bef26641990c1f31ad2839e7ed0342a5a262255b770ca922f7d173c998e0ff11c594bf8efab
-
Filesize
78KB
MD549f417de4aaae069d5b2d5d5a4ddabe1
SHA156772fe3d3a7f7865d412e3b27c11ec7e7c9e3c1
SHA256f1930ca4c78029fb41f3f661194b9d3001d0a99f45d68bf3a4a87d9ea36aad20
SHA51283f5be813cb8c0d738dbc27ab45ac561aa0dfe65c5caf72f47a72e3afa05e7e750ac63cf9a42a983a86ce33b25bb1426e0b2e78d62598616fd040b72c34419f4
-
Filesize
151KB
MD54ddf64b25544d11a28215052a394b457
SHA18c9d674f5cd29ba44fc6f525a184cbb7934fe006
SHA256b673e41306d6df496151017ecb153a69e0be509b448697d70427ac82c1664974
SHA512231bbe17bf1e5bf0173e396ea3703f93a48404a08eb6665f1f20c3d107b7370859fff2b5ec5f2515a47f7541ba3426eaca624ee1e13b1bf9da38edc3177dea7a
-
Filesize
769KB
MD5eb2405b0614f8d5fcf08941f5b691595
SHA1d36bd2b278bd031a97ab5b8fb9501a90f1e0684c
SHA256a4b69a12bf6f52fec0a801941f21f8d120056d824c43a73e5709b59183c5f092
SHA512492bf62a1e76c8188fe9486019c089c471f6277249440ef64a0e16b635956e9c1f0edd4d8101c3092a346b64c49b6fe34cd2548b2146091ad8803ee1a1361f12
-
Filesize
3.2MB
MD5cc4cbf715966cdcad95a1e6c95592b3d
SHA1d5873fea9c084bcc753d1c93b2d0716257bea7c3
SHA256594303e2ce6a4a02439054c84592791bf4ab0b7c12e9bbdb4b040e27251521f1
SHA5123b5af9fbbc915d172648c2b0b513b5d2151f940ccf54c23148cd303e6660395f180981b148202bef76f5209acc53b8953b1cb067546f90389a6aa300c1fbe477
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
673KB
MD5bc778f33480148efa5d62b2ec85aaa7d
SHA1b1ec87cbd8bc4398c6ebb26549961c8aab53d855
SHA2569d4cf1c03629f92662fc8d7e3f1094a7fc93cb41634994464b853df8036af843
SHA51280c1dd9d0179e6cc5f33eb62d05576a350af78b5170bfdf2ecda16f1d8c3c2d0e991a5534a113361ae62079fb165fff2344efd1b43031f1a7bfda696552ee173
-
Filesize
4.0MB
MD5b8a6aa94b49a9230f554a15ee6e58b63
SHA1bbb48404391262242f2dc3b7fec045283a2c4416
SHA256021f222f0bacacc490081f5a37bd78148e34f22fabe89587e1e0c6841390b7c5
SHA512464d702b1291fd392ce767130f054a0d32b024480ffe4ad60fbc5cc6735031be28d1839db530f7a20b03b3eda782d324482f38111d9e9afc2cae3579f07e52c2
-
Filesize
27KB
MD5f3702dfaffad5d95ac7022abf84440f3
SHA1a78d5994aad9a82b8cfaff1ef4eaba38bab9ce7e
SHA256cea18e860d251fbf4e9bf6e8689ba23b43db4cdb9fd421270e8ed1c3b1aa4401
SHA51207cadc08bfb86633c8d54b717fb06217af0c586ddade537a6000ae662d2adbd3107e30d32f28130041357d108eaf1f67a13ae3858be0d18daf2123666d2c26c5
-
Filesize
1.0MB
MD5b36dbbfdbe686f33d50414c288c1acb8
SHA1b389d6a8bdd9bb7d2b579a48e8e9ba94fca499bf
SHA2565ed7787555704626da817b872c60eac09b984ffdf00d5aacdf06b6d9a935b105
SHA5127ad66bb84b38b8153279c17ac80be44d0f3b96a937a906fb2dcaf664fbb9d0cb696a0d8ad8942951e68ef6b7ac7855fbc5b59bca03d262471b9f74809db5ac91