Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 14:18
Behavioral task
behavioral1
Sample
eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe
-
Size
134KB
-
MD5
eff9fd511b62c7b9a5eb6c8584afc0cc
-
SHA1
d173943fac4e87e17bb66e7a6d445c35c5df9a57
-
SHA256
419a0ef3d60d9be1cfaa1ff897a8713d9699b4950b2fe932312a66f3f7a757e3
-
SHA512
fe12a4057cd9b6a6ad16c491976dcdb99918be84790608b9ffac7a76a2ed8500f07dd61d96328833737f6446a72f484b6c9006e7164e6db52b1c4c297d4b2f08
-
SSDEEP
3072:KL1SE8b1R1Fw6qPrZZGa68rBSf77Ul09z7AeF:w1SE8l6LHGa6gk77UloMeF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3624 Pxania.exe -
resource yara_rule behavioral2/memory/4420-0-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral2/files/0x0007000000023486-8.dat upx behavioral2/memory/3624-10-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe File created C:\Windows\Pxania.exe eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe File opened for modification C:\Windows\Pxania.exe eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Pxania.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Pxania.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pxania.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\Main Pxania.exe Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\International Pxania.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe 3624 Pxania.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3624 4420 eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe 84 PID 4420 wrote to memory of 3624 4420 eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe 84 PID 4420 wrote to memory of 3624 4420 eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eff9fd511b62c7b9a5eb6c8584afc0cc_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\Pxania.exeC:\Windows\Pxania.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5eff9fd511b62c7b9a5eb6c8584afc0cc
SHA1d173943fac4e87e17bb66e7a6d445c35c5df9a57
SHA256419a0ef3d60d9be1cfaa1ff897a8713d9699b4950b2fe932312a66f3f7a757e3
SHA512fe12a4057cd9b6a6ad16c491976dcdb99918be84790608b9ffac7a76a2ed8500f07dd61d96328833737f6446a72f484b6c9006e7164e6db52b1c4c297d4b2f08
-
Filesize
390B
MD51df03ba159d9865e07b6dd01d687ae4d
SHA1fb6c4e596ec732489a3fa437a61656f3667f0e43
SHA2560bba411f13f572df759bfe7cc56be94146549fae78f030199f21c03b1f967529
SHA512f83a0de339c6514484b23722260dd2f566652824be1d05bd86755c9073a1c07e62ea45d3c6e5f59f85bafc6559ab66370fd5db809db8e98c9c9636946da17212