Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe
-
Size
130KB
-
MD5
d242eac273bd1a414f92f5729b29bc06
-
SHA1
a095c2883460eb32bb75bc7b3a26997c2cae1ee4
-
SHA256
f13053e2cc8ce442539c9add379de1a3d4eab01e70c3cf7224c0181e6f4e9472
-
SHA512
12a6216cb40abdf4f0eec55b6ec7a2b257d5e13eb5e99e6bca0a8f2c4bcb7c7e33172415d9b64fecd11647d323bf0182e405288c4690f3e28141154c0cfaf1da
-
SSDEEP
3072:pmO9nEJjKxZCFS/mJ9zKm02nuksJ7uYWUeA9PdoO:3JEUrtk9zT1nuk9YWUddo
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4768 set thread context of 3120 4768 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4768 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 4768 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 3120 svchost.exe 3120 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4768 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4768 wrote to memory of 3120 4768 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 88 PID 4768 wrote to memory of 3120 4768 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 88 PID 4768 wrote to memory of 3120 4768 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 88 PID 4768 wrote to memory of 3120 4768 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 88 PID 4768 wrote to memory of 3120 4768 d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe 88 PID 3120 wrote to memory of 3960 3120 svchost.exe 89 PID 3120 wrote to memory of 3960 3120 svchost.exe 89 PID 3120 wrote to memory of 3960 3120 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c for /l %i in (1, 1, 4000000000) do if not exist "C:\Users\Admin\AppData\Local\Temp\d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe" (exit) else (del /f "C:\Users\Admin\AppData\Local\Temp\d242eac273bd1a414f92f5729b29bc06_JaffaCakes118.exe")3⤵
- System Location Discovery: System Language Discovery
PID:3960
-
-