Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe
-
Size
7.2MB
-
MD5
ea299b53389ad382aa272039cb3466d8
-
SHA1
7fd15ce86b7c6f0dc3827451ceb24fcefa9a3133
-
SHA256
2c20f517b33d5c011d9f90e1dbc58f47335f6c10ca904fd9fc61ed56152c8ebc
-
SHA512
4c28f9619f76cd4c8d3aeed54e127c2391d43e57124ff7a0e89f0bcc94332c8678a1c4395d5d4fd4e735cecc4f5b753953077dc0ff0c558222e202c789df62a3
-
SSDEEP
196608:n58T9Nw+FZYIMbWRgLoxGr/atp5oPkes8pm5Ja:5sNwdXbHCGmtAcedpmva
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3604 ScreenshotCaptorInstall.exe 4816 is-TB5EQ.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenshotCaptorInstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-TB5EQ.tmp -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3604 1596 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 89 PID 1596 wrote to memory of 3604 1596 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 89 PID 1596 wrote to memory of 3604 1596 ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe 89 PID 3604 wrote to memory of 4816 3604 ScreenshotCaptorInstall.exe 90 PID 3604 wrote to memory of 4816 3604 ScreenshotCaptorInstall.exe 90 PID 3604 wrote to memory of 4816 3604 ScreenshotCaptorInstall.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea299b53389ad382aa272039cb3466d8_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\ScreenshotCaptorInstall.exeScreenshotCaptorInstall.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\is-MU1RF.tmp\is-TB5EQ.tmp"C:\Users\Admin\AppData\Local\Temp\is-MU1RF.tmp\is-TB5EQ.tmp" /SL4 $8024E "C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\ScreenshotCaptorInstall.exe" 51712 517123⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5270220b7df9bd2fc05509f75ee129cde
SHA1e39794afb25055a2dabd545424654f1858426dde
SHA256edb76332509e1f0a59840878eec04d313209f1ca14d8649452afdbd3dda72c19
SHA5127c0d734be748e435ab3d61e6db812f50b225ab588ebdf9b0b1c6aec914a1c99496cfe934fb22d3ed16f17adeda813e6449559f9704b0ee397ace70bd3cec7693
-
Filesize
616KB
MD50e5fd0fc130e2380b08edca8f822f382
SHA1e36aacde42ac8f297d3bffb379c021639ef4c06a
SHA256d3f6c4e1b8e6d11661d4bdf79b438382bb5951e7a42cedbcac3ebbe88012373c
SHA512efaabebb37413eb2a689be4070827dbeb9ba8f88f6a90a3ed33225c68eb02e43e4760dcfdf3e59eba589db0519e9ac447035ef9b3822c0414ccebdc79a5bde37