Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 05:40
Static task
static1
Behavioral task
behavioral1
Sample
c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe
-
Size
92KB
-
MD5
c84e8628022759ed6da731cd602e79d7
-
SHA1
274d698e376a37c6348503f412b2d7fc786f6793
-
SHA256
f9d55c762bd11eb5e3c4170cf0e64182d870a1028f1cd7559f286a708a04c8af
-
SHA512
b210a503ab738d68bef4f7aa78ea997258b170b4b2c1a48a3463da632e3b459b420bff9dff33132b5f6b0f921ebbf8131742a8332ac1e9e1fbc2f827ea917c9a
-
SSDEEP
1536:bay0ZomDRLBNzQsht+bBMyOMDcFx8ywwPG7S7eUYRoJJ7SiPMMm:OoG7ZL+bBoqkuwPGieUYRoJLPMMm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1544 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1544 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4300 wrote to memory of 2076 4300 c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe 91 PID 4300 wrote to memory of 2076 4300 c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe 91 PID 4300 wrote to memory of 2076 4300 c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe 91 PID 2076 wrote to memory of 1544 2076 cmd.exe 93 PID 2076 wrote to memory of 1544 2076 cmd.exe 93 PID 2076 wrote to memory of 1544 2076 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c84e8628022759ed6da731cd602e79d7_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\del.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\PING.EXEping -n 2 -w 1 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1544
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4108,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:81⤵PID:3240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD5b84e516d508cf2fb5210bb5baa19e155
SHA130108f9301f310ed43eb89f8cf9185905916748a
SHA256faffcd13b85579ead8256a25a368d93c36df17a43e2642d331bccb9934e221c5
SHA512169ae17392c6b7fc004c3e37db4012d8f75fd8324430f5569524f574ec56d778be420439520ca3d79e43aedb91d298621a78a7c9911548a5b07606392a84bcd2