Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
eac08db3fa1c18e939aba316744b3aeb
-
SHA1
262dd8ad27f510a2a53fdb7e5f8915a82bd108d1
-
SHA256
9399ffc9d442614d48abd29418d5872405a3a19ac77b9646cf39bf44bb0b0483
-
SHA512
aac17f8de6f35b740b4bf6d18f55fb2c5f399ff6d902db1fef6c3ce9ce0abb2eb3b21eee85fea537c6fce40fbfaa311edef4d34d722d084aedf2b88acec063de
-
SSDEEP
24576:s6QJy1KWYl+CyvvgkOYoNWcMTsUEb2UMNKElXS4cWquWmWzeysLWJo:9Dt9OYoNkTsrL4cWquWmWzevCJo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation usnscv.exe -
Executes dropped EXE 1 IoCs
pid Process 3384 usnscv.exe -
Loads dropped DLL 2 IoCs
pid Process 3384 usnscv.exe 3384 usnscv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfmon = "\"C:\\Users\\Admin\\AppData\\Local\\usnscv.exe\"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4004 3384 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language usnscv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3868 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3384 usnscv.exe 3384 usnscv.exe 3384 usnscv.exe 3384 usnscv.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3384 usnscv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3124 wrote to memory of 3384 3124 eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe 89 PID 3124 wrote to memory of 3384 3124 eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe 89 PID 3124 wrote to memory of 3384 3124 eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe 89 PID 3384 wrote to memory of 4892 3384 usnscv.exe 90 PID 3384 wrote to memory of 4892 3384 usnscv.exe 90 PID 3384 wrote to memory of 4892 3384 usnscv.exe 90 PID 4892 wrote to memory of 3524 4892 cmd.exe 92 PID 4892 wrote to memory of 3524 4892 cmd.exe 92 PID 4892 wrote to memory of 3524 4892 cmd.exe 92 PID 3524 wrote to memory of 3868 3524 cmd.exe 93 PID 3524 wrote to memory of 3868 3524 cmd.exe 93 PID 3524 wrote to memory of 3868 3524 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac08db3fa1c18e939aba316744b3aeb_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\usnscv.exe"C:\Users\Admin\AppData\Local\usnscv.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\winupdate.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\usnscv.exe\"" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\usnscv.exe\"" /f5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3868
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 13763⤵
- Program crash
PID:4004
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4448,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:81⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3384 -ip 33841⤵PID:3740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD56f893fa27049e87617787e4964ad5ecb
SHA12efa3418e797e4d5ced66044eff405cb2f93060c
SHA256a9912cc06ab8465ecbf27c5b6887ba94421e213d1fff1467ee1d8f20a72f0b60
SHA51208188fd11947612212701c3fffc253bb69530091115cf6c59650ed70851a8b56b5508cf458df9e742956144be1b3738560a33871a4be782798a63f04b7dae57f
-
Filesize
371KB
MD5261f8f41c5ebde7d803a9f5b54a0a31d
SHA1562b4a28bb63bc1f5fb3e1929542b401613a71c2
SHA2569c4babe2ac629a565f9a6ed31ca9a93b2e764dc5449ecb5b54a05ff154e6a222
SHA512ae3a87d6560c3b9e905b4e76d0c97407fd49dc700ddb2090963e7f51eb6a0cd16a9fa13464425400994d7589334cf0d61d2e06c9a65491bd180f9f8543d28058
-
Filesize
676KB
MD504eaeafbb8694b0ebcbfde1aa57a94f7
SHA131efde2ba3e1e6f9e2260fa06ed5947a088b6579
SHA256de96b38a3e13383e2e9300d03a69706750c170e3bcb8ede863266b4683e58fb5
SHA5123345fa02ee2708d766718cc9b56c93b2096c516e9ea647533379e2f4a54e5ca0ac1bce2348659fe03bcd0d954300fd42acc2ed36ee4f61579839059dbad9a9c7