Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe
-
Size
964KB
-
MD5
eab54fa7315ca388b13d9bbb8e37ce14
-
SHA1
6d741eaf7cd0ea9d53052225d4f6bc5aa5ee21b3
-
SHA256
95a27c1190affa00f069cb8966f9c5487ac4009848021596b57478658cbfe28f
-
SHA512
33a600fc4edb926de1726af9d02ac11130ee896ee4373c831b65103e337789e3c3ab36f02760d3365c9f42bdf826f0a3b49ac4216ad2de55c4f1cd1873bbbdf7
-
SSDEEP
6144:eS+M0ROoZ04CUpNZ7xbKoV2cN+P31ja/VozMUqKfA:eS+MgLCUpn7xbNZN+P31ja/NvK
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 4460 registry.exe 3320 registry.exe 2712 registry.exe 3068 registry.exe 1764 registry.exe 784 registry.exe 4224 registry.exe 2032 registry.exe 568 registry.exe 1104 registry.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\registry.exe eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File created C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe File opened for modification C:\Windows\SysWOW64\registry.exe registry.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language registry.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4328 wrote to memory of 4460 4328 eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe 82 PID 4328 wrote to memory of 4460 4328 eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe 82 PID 4328 wrote to memory of 4460 4328 eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe 82 PID 4460 wrote to memory of 3320 4460 registry.exe 90 PID 4460 wrote to memory of 3320 4460 registry.exe 90 PID 4460 wrote to memory of 3320 4460 registry.exe 90 PID 3320 wrote to memory of 2712 3320 registry.exe 92 PID 3320 wrote to memory of 2712 3320 registry.exe 92 PID 3320 wrote to memory of 2712 3320 registry.exe 92 PID 2712 wrote to memory of 3068 2712 registry.exe 94 PID 2712 wrote to memory of 3068 2712 registry.exe 94 PID 2712 wrote to memory of 3068 2712 registry.exe 94 PID 3068 wrote to memory of 1764 3068 registry.exe 95 PID 3068 wrote to memory of 1764 3068 registry.exe 95 PID 3068 wrote to memory of 1764 3068 registry.exe 95 PID 1764 wrote to memory of 784 1764 registry.exe 96 PID 1764 wrote to memory of 784 1764 registry.exe 96 PID 1764 wrote to memory of 784 1764 registry.exe 96 PID 784 wrote to memory of 4224 784 registry.exe 97 PID 784 wrote to memory of 4224 784 registry.exe 97 PID 784 wrote to memory of 4224 784 registry.exe 97 PID 4224 wrote to memory of 2032 4224 registry.exe 98 PID 4224 wrote to memory of 2032 4224 registry.exe 98 PID 4224 wrote to memory of 2032 4224 registry.exe 98 PID 2032 wrote to memory of 568 2032 registry.exe 99 PID 2032 wrote to memory of 568 2032 registry.exe 99 PID 2032 wrote to memory of 568 2032 registry.exe 99 PID 568 wrote to memory of 1104 568 registry.exe 100 PID 568 wrote to memory of 1104 568 registry.exe 100 PID 568 wrote to memory of 1104 568 registry.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1152 "C:\Users\Admin\AppData\Local\Temp\eab54fa7315ca388b13d9bbb8e37ce14_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1148 "C:\Windows\SysWOW64\registry.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1096 "C:\Windows\SysWOW64\registry.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1124 "C:\Windows\SysWOW64\registry.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1116 "C:\Windows\SysWOW64\registry.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1136 "C:\Windows\SysWOW64\registry.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1092 "C:\Windows\SysWOW64\registry.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1144 "C:\Windows\SysWOW64\registry.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1108 "C:\Windows\SysWOW64\registry.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\registry.exeC:\Windows\system32\registry.exe 1164 "C:\Windows\SysWOW64\registry.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
964KB
MD5eab54fa7315ca388b13d9bbb8e37ce14
SHA16d741eaf7cd0ea9d53052225d4f6bc5aa5ee21b3
SHA25695a27c1190affa00f069cb8966f9c5487ac4009848021596b57478658cbfe28f
SHA51233a600fc4edb926de1726af9d02ac11130ee896ee4373c831b65103e337789e3c3ab36f02760d3365c9f42bdf826f0a3b49ac4216ad2de55c4f1cd1873bbbdf7