Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 07:03

General

  • Target

    e1f212620ac48c9cea8bfff8b352c1fb_JaffaCakes118.exe

  • Size

    426KB

  • MD5

    e1f212620ac48c9cea8bfff8b352c1fb

  • SHA1

    e0a4a1d4a75b8981bb7bbc04182bf2fc02a8123e

  • SHA256

    f59a19afd14f9796968328a53be7bdc4c49268ddab4522fe755d05d91059d3ab

  • SHA512

    a7e8194a581d4b1265cedf4e06c5e363c56d721a4f712ab73ac019759f364ee93eb67d8d6db8359d041efaedbf5214fe271732429f3fe3c4dd01b8111071fc69

  • SSDEEP

    6144:a7dgSLU1270HRhS/ItpMtZ2nS3ll7b4mj/joE2XdhWHKzDt4rU8ayzktrtI:NCUcoXS9Z2+H7bZ/jo3oKPur3ayQtrtI

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e1f212620ac48c9cea8bfff8b352c1fb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e1f212620ac48c9cea8bfff8b352c1fb_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1468-0-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/1468-1-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-4-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-3-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-5-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-8-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-9-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-7-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-11-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/1468-10-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/1468-13-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-12-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-6-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-2-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-14-0x000000007FDF0000-0x000000007FE4C000-memory.dmp

    Filesize

    368KB

  • memory/1468-17-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB