Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 14:25
Static task
static1
Behavioral task
behavioral1
Sample
eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
eb85eef7f23eb12cb8e2e2c049d13646
-
SHA1
5a8c70521887ebae895d8dd2cd96bccb10957702
-
SHA256
ec4bca3f7974faa476217c97a9913479fc369086e7060912cdf1a1aed9e115c4
-
SHA512
d6a262d17fc7174da1faa6946a6b99035d2677d6814403f04fdf26d44dce302457a843844acad847bd232eb79decba1181c00b9ac2ef6f3f55cfb5797eeea4f8
-
SSDEEP
49152:gWrp9+hCaXF8Rp65tmsTrLlAgiorYimBkVSBVcCYqEo9nQWOVuLSVC6jraumh:ZDaXGRp65t5T3T6im6SBVcCl3QiSVC1h
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87 PID 1008 wrote to memory of 856 1008 eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb85eef7f23eb12cb8e2e2c049d13646_JaffaCakes118.exe"2⤵PID:856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e428781c313b3c23ec4a1c5337f7692e
SHA1a107e65dc785a987fb12a718c1da9f5e73117c8a
SHA2562746e9dea21140ba115f1b072ffc78ef92e1a59e22b20a93723e8fc3e85d7c48
SHA512f95cf84342230e3391b26762a3aa8e7c172f23627306f74e5db02e119d6606d7d639061e780c32fd933976b282119be343582d5c2f9a9eb3838c7f353c728a2e
-
Filesize
2KB
MD5b4e6aa5c5d59eb0ac59db4b58748a674
SHA160f91be8adb9b3eb65879a5fbfc63b79b1118f85
SHA256cc451a52fc7415df92d7887bd3210bb6df2b9744efa65a3dbff844ad488e37f9
SHA51294cb5df4f8920c7888783b1aa346bc4d29536d6bc84173774e8c0a7c5ef5767822159824720961ce64cd5d688d69266711ccc48ce3cce302a4f411273a890de4