Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
dfcdc27fd15df21b58b51284bc08baf3_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
dfcdc27fd15df21b58b51284bc08baf3_JaffaCakes118.exe
-
Size
192KB
-
MD5
dfcdc27fd15df21b58b51284bc08baf3
-
SHA1
6536be02e2066b9038576d3d50dc1eeec41939af
-
SHA256
450cd29c09adcc079016237fbb4a88bbed362a8e015cd4ea6519daa2568649c9
-
SHA512
3f952f436a245ec1033792df84671d9e8cd8eb9d35783da06973e23ddf9126e0e5c7e7a1b43a89aac846fd057227e994e51677aad5fd8c2aa146195029063855
-
SSDEEP
3072:EY9OZYEgUuimQJY+R8zB5NP3w0wOCs0vrz2Vb3yf0Xitp4HBKBs+zqlL55uf25Sm:EY9OZYEggvJY+i5NP3w0wOCs0vrz2VbN
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000900000002341f-3.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 320 yl_fuck.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfcdc27fd15df21b58b51284bc08baf3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yl_fuck.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 320 212 dfcdc27fd15df21b58b51284bc08baf3_JaffaCakes118.exe 83 PID 212 wrote to memory of 320 212 dfcdc27fd15df21b58b51284bc08baf3_JaffaCakes118.exe 83 PID 212 wrote to memory of 320 212 dfcdc27fd15df21b58b51284bc08baf3_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfcdc27fd15df21b58b51284bc08baf3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dfcdc27fd15df21b58b51284bc08baf3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\yl_fuck.exeC:\Users\Admin\AppData\Local\Temp\yl_fuck.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5fbf37911b3960af01edce84345d2909c
SHA1fc2e7fc4093c9bc693a73748f65cdae2f87ebf1a
SHA2566b5433a2ec878fc100acb0f2d5107d0764395e5a0d71eb6ef3146b742736380f
SHA5120c45119591097f4395a1fa48a358e4b8ec5f446dbe06b2a1c495aeaf378a78d4b21d3c6a189b6c805279a69c7924e05b03366b20b69ca268cbfda91574ff7e4c