Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3ee9149569f...18.exe
windows7-x64
7ee9149569f...18.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...rl.dll
windows7-x64
3$PLUGINSDI...rl.dll
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ButtonLinker.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ButtonLinker.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/waterctrl.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/waterctrl.dll
Resource
win10v2004-20240802-en
General
-
Target
ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe
-
Size
2.8MB
-
MD5
ee9149569ff6bd167a0a9eaedb0ad77d
-
SHA1
226fa6859c0cc112f66b43907ba9be87573ef67e
-
SHA256
fa0572c044c10429d2a7e84b03d315dc414ffa06fdcf81e39ecd2e8583fbddd5
-
SHA512
ed030764479d1a2f94e0ebab1701df796f615ed5975678fedf99da29bea2b8fa170682fcd03006db3b47c36dd17dbdf7b49b657f7f94ea13ef1a482b8d0cab76
-
SSDEEP
49152:4eP6VXAMh3sjVY8skSsAQGRTYWltYTzuFgV9gnEwMjAu5AJrOry3gIsppt:DihAe3sZDZglCTzuFOgEw2AoA9OGzspD
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
pid Process 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4820 ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee9149569ff6bd167a0a9eaedb0ad77d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5dd85ac7d85c92dd0e3cc17dfd4890f54
SHA1a128fb7a05965c1a9913c6f5e419e6c4c0a7d2fa
SHA25627abd2a4fb1bf66add60221b52d061bbe24d2d21e13600725ff7a5c6c777b504
SHA512e4ff8216c65110a9d156f37c2062acb53a72daa8af12dfc24278920d9e1a4083a81b1446759df75405b2da34c7bfb1afc33184feedd0aee4ed73f79fcbb1a8a1
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
578B
MD51f385ea695d6e4fc78e9d59426d66ffb
SHA1fa487e4b255305ad5b7af6f223be82f6d179c5f5
SHA25605dcd640b2fed43ba063c44c128fb9e84f7fde33bbd266f19c4e4ef65e6dedef
SHA51284b97e1e0bc7378a30df346939c7e9a8cd6196069f6a627b3c2f164ddf4675fe7cdf79faad4216f1fd6700b5eb3297c07e7d5f11ba39f29dcfdf8aaf98b1cb01
-
Filesize
611B
MD5e180bdf1fa34b2a8acc71e229f6ad743
SHA1a9d8e52ee5bb311ebfba5515b2781ea4e1911115
SHA2569bbfb736763098fa98ceb09fe8bdaa6f49f3dc33af6a936f0631997c9a91a581
SHA512e3fa2959221e933c2769a07652a9755bb5d179ffee81192fe1b6d22766d2f5b6d48f871bd61597e2ea5428f3288318457f54d903076f2e370629951165e05af5
-
Filesize
16KB
MD53d2a9eebe3b8d170cd5ddc4baecb4386
SHA14106951885c5d2168c74a192c2818228c2a67462
SHA256491e350cdc0320a6a9cbc1470a5490fe29eec67624da63ea9301d1dc8199b6a1
SHA512819c8a85941eb4b6ab998c0b768a8484c6aad536431dc9d426971c96f2d17e3decee7bd1d5be511cb830f4f2277728b84411d624221b4246d91959ea5d07a649