Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe
-
Size
36KB
-
MD5
ebdfbea915df9687e6e745a9dd4e816a
-
SHA1
8edfbf995b581a6ec241e8b22685592da96b11f7
-
SHA256
8b5be3415040fedbbb321b730fa0f3d1f4f3344b5e4451f967c340ec623ce1bb
-
SHA512
a915b8db6a054a26d2454ce954f5dbcab8be78fad3652ba530d290f160974a5734cedb2cac0ec137c89b023ddf1047c14cfc464c4a7987b45a2ec5f70cc6624d
-
SSDEEP
768:QATJxFQM1+Bw8JrV4UYW50z4C6AXTzM7WyjiTd:QA3cBw8JrydM7W7J
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 812 set thread context of 1060 812 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1060 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 1060 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 812 wrote to memory of 1060 812 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 82 PID 812 wrote to memory of 1060 812 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 82 PID 812 wrote to memory of 1060 812 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 82 PID 812 wrote to memory of 1060 812 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 82 PID 812 wrote to memory of 1060 812 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 82 PID 812 wrote to memory of 1060 812 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 82 PID 812 wrote to memory of 1060 812 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 82 PID 812 wrote to memory of 1060 812 ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebdfbea915df9687e6e745a9dd4e816a_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-