Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 01:05
Static task
static1
Behavioral task
behavioral1
Sample
d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
d0c4cf143da66d834647768ea972404d
-
SHA1
1428df1c2d495c65374030931d8eb1848a4a1cfd
-
SHA256
0402c9d87b198990ad4a70aa62306aab9edd92ae571b91ec2da1943f70625b0b
-
SHA512
abf522eac17cda918ec421f710efbeae7b0de4b32bbae21db106284226f326ffa213e21f5bc680dc22be3ebc865aeae1b7b12e4502a474c7895f12a672232def
-
SSDEEP
24576:rH6aLepHzvNAd0GnbT1SNsA/CCNvLPAEIRbNfYTRrT2JnOTN567aG:rH6ageJv1SOSC0A9bN2R32JnOB5yaG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3076 1624 d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe 93 PID 1624 wrote to memory of 3076 1624 d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe 93 PID 1624 wrote to memory of 3076 1624 d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe 93 PID 1624 wrote to memory of 1512 1624 d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe 94 PID 1624 wrote to memory of 1512 1624 d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe 94 PID 3076 wrote to memory of 4476 3076 cmd.exe 96 PID 3076 wrote to memory of 4476 3076 cmd.exe 96 PID 3076 wrote to memory of 4476 3076 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\winupdate.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\cmd.execmd /c copy "C:\Users\Admin\AppData\Local\Temp\d0c4cf143da66d834647768ea972404d_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\\usnscv.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4476
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4276,i,13995403245988825027,7033610968827661507,262144 --variations-seed-version --mojo-platform-channel-handle=1316 /prefetch:81⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162B
MD524850fb2b3944f01139ec86755e93b2d
SHA1dfcee57629eac35f70ea411b2844d11fd3a9bb3f
SHA256a2969e030c760ee1ddfb6711be804537e29cfd7a60350392d664722c7fc44072
SHA512ac8e24c3a9e6053419ea3c2491c4dacab8ae4a126951623470f8e1923b4f80b5905683d6aa93491eb2b786781314eeb59d6b912f0b98ded01e375ead64de9403