Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe
-
Size
56KB
-
MD5
bf608a87faa84166fe27cbb7000a3a92
-
SHA1
b9eae3631187158d52ef64729a530e9925252b78
-
SHA256
bcf4d9bf0c68ce1bba959ef901fa9ed225af4d922aeb2032663975377e59176a
-
SHA512
2365318f2acdaba53dd8629b2c562e93a08ad5f4149df8abdd77d0c70711408b8154c5d9c4798467627ab7bf71b2acd764b72cea1c55035ffedf764e1e13faaa
-
SSDEEP
1536:2oESKCo5uSKeg1EBCdoB6WwAZkK9cmmr5Tjx:fESKCo5+i6Ww/Tjx
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4100 set thread context of 3200 4100 bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe 83 -
Program crash 2 IoCs
pid pid_target Process procid_target 1388 3200 WerFault.exe 83 3516 3200 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3200 4100 bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe 83 PID 4100 wrote to memory of 3200 4100 bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe 83 PID 4100 wrote to memory of 3200 4100 bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe 83 PID 4100 wrote to memory of 3200 4100 bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bf608a87faa84166fe27cbb7000a3a92_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 5043⤵
- Program crash
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 5123⤵
- Program crash
PID:3516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3200 -ip 32001⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3200 -ip 32001⤵PID:376