Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
c827cac019947666107e952f030d5a9f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c827cac019947666107e952f030d5a9f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c827cac019947666107e952f030d5a9f_JaffaCakes118.exe
-
Size
208KB
-
MD5
c827cac019947666107e952f030d5a9f
-
SHA1
5f0d1aca72104be27fa15e42f64f5d8e44b93058
-
SHA256
0e69e978722e01667f8fce4336bae281e03ea52a210852e58636e0852fb0d6ae
-
SHA512
2d1562c4441bdf1ef6b97c9ad054a52c1d57b3b4ca3f0955519ae9bb2876ad87aa64f67e77798e5a7723aee431e2ab9a606a2d3098264bb2b5929409403957eb
-
SSDEEP
3072:JO+bY++73VQdqPg7WqD+NhGJZstCVH9xGSp+BPq19XAHtUcmzA:MWWzcJZs0d91WPquUcmk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation c827cac019947666107e952f030d5a9f_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3112 IEMontior.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEMontior.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c827cac019947666107e952f030d5a9f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3096 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3112 IEMontior.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3400 wrote to memory of 2316 3400 c827cac019947666107e952f030d5a9f_JaffaCakes118.exe 89 PID 3400 wrote to memory of 2316 3400 c827cac019947666107e952f030d5a9f_JaffaCakes118.exe 89 PID 3400 wrote to memory of 2316 3400 c827cac019947666107e952f030d5a9f_JaffaCakes118.exe 89 PID 2316 wrote to memory of 3096 2316 cmd.exe 91 PID 2316 wrote to memory of 3096 2316 cmd.exe 91 PID 2316 wrote to memory of 3096 2316 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c827cac019947666107e952f030d5a9f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c827cac019947666107e952f030d5a9f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "IEMontior" /tr "C:\Users\Admin\AppData\Local\IEMontior.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "IEMontior" /tr "C:\Users\Admin\AppData\Local\IEMontior.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3096
-
-
-
C:\Users\Admin\AppData\Local\IEMontior.exeC:\Users\Admin\AppData\Local\IEMontior.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD55af5724703b1905e9438f416ae0e9c67
SHA1b5ff60eb691336b1ed4bfbf006cd935a0147724f
SHA256291e0912fcd042b10f9753e1816c88fe16a1dbb8d2d9a2ddd8ca22350cdf471c
SHA512c72575ad5fe8e73c2694b924d49401fbc7a9e772df9c9cca41ff2aaa19bb63fe03b66a5e50ef8195546f84da318ba1062acfb73219601d8f0e9ceb1dd5a50333