Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 21:27
Behavioral task
behavioral1
Sample
d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe
-
Size
239KB
-
MD5
d2df66d88cbff5e164be386687f3825a
-
SHA1
2c3bc92f394f9fe290f5227ae967bb86997f6a08
-
SHA256
28f0fdb5243326167eee0bdcec325761adb8a0af3e809f465f6e51ea50237b3b
-
SHA512
c1301ce38f8a9ab47de786d44a071048f2b0d09da7337c38e8c30b0ddb00e1926f992b7e818ebb874abf2533691388d5d3540274631b9c3b19a9bf2e310dcbcf
-
SSDEEP
6144:U0RVp1dUl4zIuR52WGCZpNTalNOUQ52hH06iF:dZUKzIuj2WGCFalAL52hH0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1352-0-0x0000000000400000-0x000000000044E600-memory.dmp upx behavioral2/memory/1352-6-0x0000000000400000-0x000000000044E600-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1352 set thread context of 3940 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1352 wrote to memory of 3940 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe 84 PID 1352 wrote to memory of 3940 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe 84 PID 1352 wrote to memory of 3940 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe 84 PID 1352 wrote to memory of 3940 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe 84 PID 1352 wrote to memory of 3940 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe 84 PID 1352 wrote to memory of 3940 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe 84 PID 1352 wrote to memory of 3940 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe 84 PID 1352 wrote to memory of 3940 1352 d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d2df66d88cbff5e164be386687f3825a_JaffaCakes118.exe"2⤵PID:3940
-