Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe
-
Size
167KB
-
MD5
bcb41b5c44ae429a861d41c953abda8d
-
SHA1
0e81e9208f3a1062da733cd68ed56a4241868fc7
-
SHA256
3efb61211a9fdfc34a6951337bb9cc735914e2d80f81d0f768e09d646a7bccc0
-
SHA512
f202e2f813ef902d5a7a5e1d9d86bb6f3a613ff1b343114caa5e1a22bf388b1c01d7dc15e27e12f13105e14608f3027e53972d3f4d467de9e5ad20416b075778
-
SSDEEP
3072:0l856uXS5CH6BDsmXYm+uJJTd4ISvyRbGLoQM71a1DzSLTjMrpKYqonqm:NSDbH7Td4zaRqLhM71rL/MtfqoT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3320 set thread context of 4740 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 1720 4740 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3320 wrote to memory of 4740 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe 84 PID 3320 wrote to memory of 4740 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe 84 PID 3320 wrote to memory of 4740 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe 84 PID 3320 wrote to memory of 4740 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe 84 PID 3320 wrote to memory of 4740 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe 84 PID 3320 wrote to memory of 4740 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe 84 PID 3320 wrote to memory of 4740 3320 bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe"2⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:4740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 3363⤵
- Program crash
PID:1720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 47401⤵PID:1860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5dd189be8f4e64c244da018a3f75c1c66
SHA192c38bbe6ae235b536fc02b50932a655d2cc5ef2
SHA256dd62d67229540479e5ea6a95de426723538e1982f8ae1410c2115cee16bff88f
SHA51265ad44d99699720cec8e79d9bdedfbf4b0d9613c4bd6bf798e294deb57763e91fb8cc0a6828894a34ca10c913a45a5069877671ed96196caf0c68c73ee0b5bd5