Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe
-
Size
136KB
-
MD5
d55651cde1b25d4f1abaf9d456477eb9
-
SHA1
e8acde597aaeec505b868de2881dca5451e2716c
-
SHA256
fc1798ed2df8053ccd28988ccb63d8d104a280bd55c51882bc8a9e7cadd3b3be
-
SHA512
e25880387ccbbebea0f366b01fd230be0c7c179913cd82231234378b576e5006336751506cecdd97742015a8f971322c7bcb777f7b5295d969cbdbc996b853c5
-
SSDEEP
3072:X1cKtGG95k4NsFUUpYqMwmB3k60ng7nKa4fjAaKGiH:X1cW9yfFUUpY6msgrnaKv
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3900 set thread context of 2360 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe 2360 svchost.exe 2360 svchost.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3900 wrote to memory of 2360 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe 85 PID 3900 wrote to memory of 2360 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe 85 PID 3900 wrote to memory of 2360 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe 85 PID 3900 wrote to memory of 2360 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe 85 PID 3900 wrote to memory of 2360 3900 d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe 85 PID 2360 wrote to memory of 1348 2360 svchost.exe 89 PID 2360 wrote to memory of 1348 2360 svchost.exe 89 PID 2360 wrote to memory of 1348 2360 svchost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe"1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c for /l %i in (1, 1, 4000000000) do if not exist "C:\Users\Admin\AppData\Local\Temp\d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe" (exit) else (del /f "C:\Users\Admin\AppData\Local\Temp\d55651cde1b25d4f1abaf9d456477eb9_JaffaCakes118.exe")3⤵
- System Location Discovery: System Language Discovery
PID:1348
-
-