Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe
-
Size
972KB
-
MD5
c80e0f6a1acbf984164e0a2d16f9cd4d
-
SHA1
690269388a936f18d0fe1bed25e8245f26a7f3fe
-
SHA256
6582e5a487f370842c09e4e0d52a60b1067c366567ea26cc0c841acbfa866c8f
-
SHA512
7e9ad5f9e5911451201f2bc14963d2585de1ed869eb02fa2fd3d7803e75dbd3a0ef239dd29d47cad7ff2e93a12d4049e72c1bd69f7f629a5b7969211fab89ed8
-
SSDEEP
24576:LUvw1uhT4Wu/yjwmfYLz8in8mxvJ7o+p5xpN:LUvw8DuHvJM45xz
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3656 ~240618281.tmp.exe 1888 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 4688 is-3MQI4.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ~240618281.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-3MQI4.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4536 wrote to memory of 3656 4536 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 86 PID 4536 wrote to memory of 3656 4536 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 86 PID 4536 wrote to memory of 3656 4536 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 86 PID 4536 wrote to memory of 1888 4536 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 87 PID 4536 wrote to memory of 1888 4536 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 87 PID 4536 wrote to memory of 1888 4536 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 87 PID 1888 wrote to memory of 4688 1888 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 89 PID 1888 wrote to memory of 4688 1888 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 89 PID 1888 wrote to memory of 4688 1888 c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\~240618281.tmp.exeC:\Users\Admin\AppData\Local\Temp\~240618281.tmp.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\~240618281.tmp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\~240618281.tmp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\is-973SU.tmp\is-3MQI4.tmpC:\Users\Admin\AppData\Local\Temp\is-973SU.tmp\is-3MQI4.tmp /SL4 $602AC C:\Users\Admin\AppData\Local\Temp\~240618281.tmp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 973338 680963⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD5f8af304447fc04618285f448d0651220
SHA1ec2dd2c8b931501f977eefef5449b37373734415
SHA256f0678194ef4b80ed8ec73ef78e5dff621c2602df47fb90e43800b6ab30c33d59
SHA512c2e4cca9a38c8a5616936b2c643596c6125782bf32619eb9e890f9a7b4a293504151b22478e308656f43fc30e7ba4d9859e1a8ac1aba5e72169b8ded7cf39289
-
Filesize
11KB
MD508232702cba0391d0ff4efec9961ba5a
SHA1a93205772634d2a694312539ed03da1a9c1ef67f
SHA2564ba4fbdb03ae978017fd045c5914474100ba64cc8bf78f7330f12e8700a2f7a2
SHA512705ab1a08532d23913f83575ca32ad32f3f287ffcd20bfb60591d06f8615d16b272a382d9eb698674b7e5485b0585469a7637ca9ba770846785fc0c5669379af
-
Filesize
958KB
MD5f5e0bd5e9c0854d19ec888bb468272b5
SHA116694ee11b04e359bd3c91cd738085a4ebd844d2
SHA256084dc7dd32b23670316cb764d45a4a1fed2d3aeb84ea3db2208c7053fbb843a6
SHA512170d8500105fee23146eb004e048664a7cecdc2120a209792ce03f32366ca0df5ab1b14388580effd76bdb5a44acec736bb2dff9a3bc9f40473b6d5aebaf4346