Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/09/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
e7cc07a1704145c6843330345fd1ce0b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e7cc07a1704145c6843330345fd1ce0b_JaffaCakes118.exe
-
Size
472KB
-
MD5
e7cc07a1704145c6843330345fd1ce0b
-
SHA1
6da282da7b2151eeb7da06b0ce8e1beb64e585a1
-
SHA256
4aa789cf7c10418cc7ae60d4f2f5e0879521d6fe6d00d381df103156b4d4c1d7
-
SHA512
45ed8bf0670a38dc090f766120e1e1612826a24434c39b6afacb04ed023fafd2561a53e2680917cb5fdcea8919bcc5c20af0e53eebaa181d186dc6b4eba01b6e
-
SSDEEP
12288:Yz2RENHa7bDjN3MyC2AzkfCpzGmZSgW+b3:Yzuw2N2pzGmq+b
Malware Config
Extracted
formbook
3.0
by
mozkuia.com
oyxezj.men
valuecodeconsultants.com
ivyleaguetraining.com
darqvam.run
izmirkadinsagligi.com
cvn8866.com
yourbigandgood4updates.review
cajienvios.com
promypages.info
trendsreverso.com
veganspoonfuls.info
p2ptexting.com
hdwmy.com
wmrobots.net
danstamos.com
rewardcarousel.com
esports-mindset.com
kccustodylawyer.com
longdingsz.com
gslzxq.com
superyachtonline.com
zigzagefflorescence.com
vdezk.com
kraus-info.com
offroadsuite.com
apotecarialafora.com
mvwacth.online
zdrowezycie.net
ogvalves.com
thebrexit.site
whydidifail.com
bleulimousin.com
chosendoorproperty.com
gdpwmf.men
xn--fhq01j.com
jiaxing.ink
louisvilletennis.net
samedayhousebuyer.com
vjawkx.men
castlepinesgolfclubcatering.net
scrossroinmountgub.win
localizarmeuiphone.com
travelbooking.win
quannengshen.com
alluringshoes.com
puyku.net
beautosystems.com
dunwoodyhomesforsale.info
8744yellowspringsroad.com
madybymischa.com
hinter-klein-winter.net
kiddosophy.com
roosters-club.com
bjyprinting.com
floriandlask.com
rendako.info
chenyonghua8.com
louisvv.com
admee.win
sparks.place
mysuperlong.com
shtieyuan.com
therealyungced.com
alchildez.com
Signatures
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3444-1-0x0000000010000000-0x000000001007A000-memory.dmp formbook behavioral2/memory/3444-2-0x0000000010005000-0x0000000010032000-memory.dmp formbook -
Program crash 1 IoCs
pid pid_target Process procid_target 4272 3444 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7cc07a1704145c6843330345fd1ce0b_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3444 e7cc07a1704145c6843330345fd1ce0b_JaffaCakes118.exe 3444 e7cc07a1704145c6843330345fd1ce0b_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7cc07a1704145c6843330345fd1ce0b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7cc07a1704145c6843330345fd1ce0b_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 4202⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3444 -ip 34441⤵PID:2896