Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe
-
Size
341KB
-
MD5
ce129cee5be5d9b0f76598f8421704ef
-
SHA1
cafa55c44306c7b34da136ae58e4a8ee5dec2bd0
-
SHA256
b1bb113dfb88b0d924755df1bf3c01ee53cb4e0f4d863adc6473a2bd67c301a3
-
SHA512
8e48d4d00913e21784a8a6eba3eb42163e148178f3cb4e611930b2adbe8c3220d8ea9550cc1176bb864e42ae2705080a1b6959f6a3a9cf9d74cc144d53ecf122
-
SSDEEP
6144:eob2C77P99/Aj78Ryyw8AalYFkQKssGuHZdiyuZscShDeDJzUOu9:evO9h7yyFqiQxfsBNeN
Malware Config
Signatures
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4188-11-0x0000000000700000-0x000000000072D000-memory.dmp trickbot_loader32 behavioral2/memory/4188-10-0x00000000006C0000-0x00000000006EC000-memory.dmp trickbot_loader32 behavioral2/memory/4188-8-0x0000000000700000-0x000000000072D000-memory.dmp trickbot_loader32 behavioral2/memory/4188-14-0x0000000000700000-0x000000000072D000-memory.dmp trickbot_loader32 behavioral2/memory/1652-22-0x0000000000D60000-0x0000000000D8D000-memory.dmp trickbot_loader32 behavioral2/memory/1652-25-0x0000000000D60000-0x0000000000D8D000-memory.dmp trickbot_loader32 behavioral2/memory/1652-26-0x0000000000D60000-0x0000000000D8D000-memory.dmp trickbot_loader32 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4188 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 1652 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3896 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3268 wrote to memory of 4188 3268 ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe 86 PID 3268 wrote to memory of 4188 3268 ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe 86 PID 3268 wrote to memory of 4188 3268 ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe 86 PID 4188 wrote to memory of 2132 4188 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 95 PID 4188 wrote to memory of 2132 4188 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 95 PID 4188 wrote to memory of 2132 4188 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 95 PID 4188 wrote to memory of 2132 4188 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 95 PID 1652 wrote to memory of 3896 1652 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 99 PID 1652 wrote to memory of 3896 1652 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 99 PID 1652 wrote to memory of 3896 1652 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 99 PID 1652 wrote to memory of 3896 1652 合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce129cee5be5d9b0f76598f8421704ef_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\ProgramData\合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe"C:\ProgramData\合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2132
-
-
-
C:\Users\Admin\AppData\Roaming\netcloud\合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exeC:\Users\Admin\AppData\Roaming\netcloud\合ェで合私つのち私いすはで愛てス意べジ私スべはつジつべ私.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341KB
MD5ce129cee5be5d9b0f76598f8421704ef
SHA1cafa55c44306c7b34da136ae58e4a8ee5dec2bd0
SHA256b1bb113dfb88b0d924755df1bf3c01ee53cb4e0f4d863adc6473a2bd67c301a3
SHA5128e48d4d00913e21784a8a6eba3eb42163e148178f3cb4e611930b2adbe8c3220d8ea9550cc1176bb864e42ae2705080a1b6959f6a3a9cf9d74cc144d53ecf122