Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 03:38 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe
-
Size
791KB
-
MD5
d0ff4361eb3904e857b3055449de8881
-
SHA1
1b11337b99f3e37c59b0d9b9eeeeb83f4f4b379c
-
SHA256
353122ba17c187329a0c4c80a54857e79b08509f238684905f3d89d8e8eb34ff
-
SHA512
556a6574859adb6a99da112af04dc9b800c6e6a4b3606d046e838e7175bf2c400565197a7089b4bec736a5f981a9c373a887132fd7e33a84f78cbd5fa51e711f
-
SSDEEP
24576:w7SPL7ypiWeo7hwD5AwHu9EGQ4MyoPtW5I:yKybfjD9EGFM25I
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zkvvamqbxprptes.eu.url d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4300 2508 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe 2508 d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0ff4361eb3904e857b3055449de8881_JaffaCakes118.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 5962⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2508 -ip 25081⤵PID:2388
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request17.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
17.160.190.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa