Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe
-
Size
5.0MB
-
MD5
eef9cc47679296944eb6f30516a68122
-
SHA1
2ac5b50f99def7420a5deebd70baad041ec83d0b
-
SHA256
21d5747bfb9baebcb597fe1314868c42a8c4d9cbc90aa7b23029fac14047a795
-
SHA512
60da1ae29a2b6ea2ad261cf52fc56b5a4d73ab2b6c17ff724d5adaa9ee4b14821f795b01b157064051959cb81320859470125392796c3c5bde0325f976ee09ee
-
SSDEEP
98304:kz3kirKWkMhxiAjngofHlh4TSydzNfNxvUW4h6OigrxvwYhkx61d23yN:Q0qDkM1/fFhABdtvUdFjhYm
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000700000002345a-9.dat acprotect -
Loads dropped DLL 2 IoCs
pid Process 1564 eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe 1564 eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000700000002345a-9.dat upx behavioral2/memory/1564-21-0x00000000056A0000-0x00000000056FB000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4056 1564 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1564 eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe 1564 eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe 1564 eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eef9cc47679296944eb6f30516a68122_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 18882⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1564 -ip 15641⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5c9f333d1ff898672a34805f94a265329
SHA12deaac66698fb2e9b3868d23034c3211c508b739
SHA25607e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b
SHA512048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add
-
Filesize
174KB
MD546905d7b2cc6a0e809f2dc0f055d962a
SHA1e49262c08844ba1bd1d3e6c8784ca8ec6f383482
SHA256edcbf6647dd7d9efc2853f6700086b335929d4112dda9e37ecf7193b025e72ad
SHA5126c0e05760d060a79203d0b440d39f0ca492374854ae178cde45514e21742f0109a9d3139d4df63ab60734d8cdbbb1d3de7dfa75b6ee21272f42008cdafff4482
-
Filesize
252B
MD5c825fbb08a259d06517c7f564a4e2842
SHA1a9f4c21f34d7d3c60a8d055378bebe415c7c881d
SHA25648f0b9a3b62815359e0fea9d41114cb8b24d69e456c6617cd0088643e7de6c08
SHA512d748d495a3514cf4882c9c6dfee746e60d5ffdf8ba363929820596a89aa236d5c3b8b0ade96bcbf2c57946d39b3cb38112722f1418bfacb56563561db3f82db7
-
C:\Users\Admin\AppData\Local\Temp\~zm_{17FC514E-A8B0-44F3-AB0F-57D9FAC22340}\js\bramus\jsProgressBarHandler.js
Filesize16KB
MD5d645bc10d1d3209e03495ba67d167757
SHA11ea1c520251538032952825e11c55519a039189e
SHA256f411aa3b252e12cb6192b052819337096a855cb182e89110f3bad35c68fc137f
SHA512d640797b117f9ec0c2570565da0294f93e7fc3fc5dbff8492221266889d8c27c162bfa07dd1eb8d18e85fcc3e9f6d2801cc18cc9faa3e7cf123566b3f229f42e
-
C:\Users\Admin\AppData\Local\Temp\~zm_{17FC514E-A8B0-44F3-AB0F-57D9FAC22340}\js\prototype\prototype.js
Filesize123KB
MD5d3a5b20d5368c1bcabe655b57b52d097
SHA1015cf89260f3e8f0b86f5a17558125c933692989
SHA256e9cca17c4320baac34e9ea5a41357ae0baffdd1beed813c2ef1f82d1179e9868
SHA5121fd0889623b195a6faf905a2a662fc08173e76ac9490e2aaf9a96390f2184d71c1d5f29c61553bab34a3ea4626226fbd9eba4a2085afb5994290c31fb87a68c0
-
Filesize
1KB
MD5dfd5cb0181c65689729c3b0640802ae2
SHA1dbedfeb009eb4f2c335bcf204496fd58070e7561
SHA2564beb1f838c3cac30b7c18070dc8e1f608f7f2d17156488907ed186b89aa7fdfc
SHA51246c70eacb6f671a7bd5c5d90081e70d86e53d4988398d3f860c972a8dc987ba8e3be7252925b9da6391e5d14a72b7fe7b5c77390c2137e45a6792d69ce6ad165
-
Filesize
1KB
MD587ff09923b8c1a22d13a0d2f78f17d91
SHA190fbbad0cc5b42fbe821869200f10f78f048a80a
SHA256bb438eefda95142a71a5aa15bb340f12ffd5e745231ed3729a92c9b1fb8da6cd
SHA512bc9af852a199e6e15123555b9c57b54239ff9bb0d38e2ad8061cde6fd4900c0d66008063be412d8bdf46233215c3c78fcdde5a624d236d889fe4b76b5da5f299