Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe
-
Size
479KB
-
MD5
ef072c5f7469a88ca616b35f21906da1
-
SHA1
6e12db7215a102918ba498fe6831932d0bd9f060
-
SHA256
040b451ddeae61cc065f2d5e780aeee6ec8d58364a86f6a97a86e4c56efe5147
-
SHA512
b6fe68f77c499b8c68e44f900c8c3df05becd3d0231d09976438977d24fec337b0a0981745cf171ecccab7cab1ab1d09d892dcdbaad8ea253e03865cfd73adea
-
SSDEEP
6144:XToCpSRFx3JcLd87NH09lXLPRvBmE+0nkMeboO2P0gqXspWu5fXnrYrjuT7:XToRFx5cLgHAldvBm1x2P0gq8pWB
Malware Config
Extracted
formbook
4.1
crb
rghandicraft.com
miamiexpressservice.com
spicycenter.com
tool-kit.info
helpinghandcleanersllc.com
ailink.network
boosterpub.com
heysever.us
fanhush.com
extremelyrobust.com
energyslides.com
fitflopsoutletstore.us
torellys.com
thatsigns.com
promotionproduct.ltd
riskynihali.com
sozialesnetz.online
fotoindia3.com
oxydj.info
dsgvocc.com
chaoshangfengfan.com
karlcardoza.com
pridevalve.com
alpinehn.com
xn--fct7hifz4l.com
wellfleetblog.net
arrete-de-ronfler.biz
shannonwalden.com
businesscoveragecompany.online
lefowler.com
oldcityfamilyhotel.com
danishtradingcompany.com
wisctech.com
creativeraft.com
odeongiris1.com
progpraat.com
ilonpolku.com
quantumkmobile.com
consultoriacge.com
files-storage-download.download
lulaolao.com
hnssscx.com
animoji.love
bambinasbows.com
yhspay.com
tersmehonline.com
diviboom.com
haid.ltd
zhaoqichanye.net
dragappextension.com
cabalgataenpatagonia.com
cheapairvapormaxfromchina.com
hookthedeals.com
innermastery.life
bwyw2b.com
6zonxm55.biz
winecoupons.net
fa361.com
xcvfd.com
kuajingge.group
794czu.info
1004too.com
journalistdefencefund.com
yourgadgetdaily.com
flekcht.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/896-12-0x0000000000400000-0x000000000042D000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3588 set thread context of 896 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 896 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 896 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3588 wrote to memory of 3260 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 91 PID 3588 wrote to memory of 3260 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 91 PID 3588 wrote to memory of 3260 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 91 PID 3588 wrote to memory of 896 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 92 PID 3588 wrote to memory of 896 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 92 PID 3588 wrote to memory of 896 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 92 PID 3588 wrote to memory of 896 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 92 PID 3588 wrote to memory of 896 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 92 PID 3588 wrote to memory of 896 3588 ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe"{path}"2⤵PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\ef072c5f7469a88ca616b35f21906da1_JaffaCakes118.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:896
-