Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe
-
Size
244KB
-
MD5
e8f3b6078e6629f2f9e0ccff6074df39
-
SHA1
77f477758e2f646f66664be70e99da9dff71a02a
-
SHA256
1224fa13afd1f551b4400cf7c6e35da7d686824e3e9191ee8714d620660c5fbb
-
SHA512
5d7a65fe447d3297fecafbac8f815295d2de7fefe2b9053a3f22464b351c5e4bc2abb76a13ed1e2760f7b4354fa49813b800a99a478c859bec7cfb77fe4d9f77
-
SSDEEP
6144:4BQ+48EIY22Fy+154GSlz9kBCFJETm7KBTdYEvf5q/jveLu:4BN48E/54xlz9kAmBfYEA/bgu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 1 IoCs
pid Process 548 Scg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 548 set thread context of 3292 548 Scg.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 964 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 548 Scg.exe 548 Scg.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 964 wrote to memory of 3684 964 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 93 PID 964 wrote to memory of 3684 964 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 93 PID 964 wrote to memory of 3684 964 e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe 93 PID 3684 wrote to memory of 4900 3684 WScript.exe 94 PID 3684 wrote to memory of 4900 3684 WScript.exe 94 PID 3684 wrote to memory of 4900 3684 WScript.exe 94 PID 4900 wrote to memory of 548 4900 cmd.exe 97 PID 4900 wrote to memory of 548 4900 cmd.exe 97 PID 4900 wrote to memory of 548 4900 cmd.exe 97 PID 548 wrote to memory of 3292 548 Scg.exe 98 PID 548 wrote to memory of 3292 548 Scg.exe 98 PID 548 wrote to memory of 3292 548 Scg.exe 98 PID 548 wrote to memory of 3292 548 Scg.exe 98 PID 548 wrote to memory of 3292 548 Scg.exe 98 PID 548 wrote to memory of 3292 548 Scg.exe 98 PID 548 wrote to memory of 3292 548 Scg.exe 98 PID 548 wrote to memory of 3292 548 Scg.exe 98 PID 548 wrote to memory of 3292 548 Scg.exe 98 PID 548 wrote to memory of 3292 548 Scg.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8f3b6078e6629f2f9e0ccff6074df39_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\RSSCom\Scg.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Roaming\RSSCom\Scg.exeC:\Users\Admin\AppData\Roaming\RSSCom\Scg.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe5⤵PID:3292
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD586c39fbe1dc4d30557695bb2ca71401b
SHA1436ebc86cd6208bf06d5b4c3a436b2929363a8b4
SHA256b6042a1f0d1222ebdd74836fc7d665af97e9c7b6e938a1a5f3a6e88ca1597809
SHA512a25f2bad6ec4ba1e297f82ec3a80e74c0c7c62ae3c0fce45e58f751b14d23bb80ac79ea9e82ba3f5f3161f2006f29a0f4a911d23cb69f65fe0eb938031740fe0
-
Filesize
244KB
MD5e8f3b6078e6629f2f9e0ccff6074df39
SHA177f477758e2f646f66664be70e99da9dff71a02a
SHA2561224fa13afd1f551b4400cf7c6e35da7d686824e3e9191ee8714d620660c5fbb
SHA5125d7a65fe447d3297fecafbac8f815295d2de7fefe2b9053a3f22464b351c5e4bc2abb76a13ed1e2760f7b4354fa49813b800a99a478c859bec7cfb77fe4d9f77
-
Filesize
79B
MD531dc097b5bb5d8ebd52a8ca98224e163
SHA1e24bdf12154a11ff0f8050d804dbbdac82493465
SHA256c2ebf0754d44271ff8451ea6f2ed9851a8aa0b531c796f4a6fc768dbef888a4d
SHA51293cb098c61b974f281e08d262351e9dd4148a16aaba6badccfd32450a4aaf07bb6515e4becc0fd29f67212874b06234895e1380c88fd1c53845b0bfdd2199f99