Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe
-
Size
181KB
-
MD5
f57a67f844f2d48d47b5f58a8b4f1f86
-
SHA1
c9f3bf2ec0e97f7ae7cffb04d4eb11345c141834
-
SHA256
c59bef3bd86101b905c74155248c12604121c499b998d3c7f4755d908ae4dd05
-
SHA512
09f5fc53348e3c17ec85fdd63d6b0c6c11847b83a8eccae0ce21ff8cdc7e16d3269329994192cfbbbac4b258c3591c7035280b3e96aca39cc4afd26144567154
-
SSDEEP
3072:Q9vQ4++zjy6eWEi20uDHoj10eJ6uU8wq/A+gXClQfmNAXSh/WLx8RqB:Uy6LEi2JDHoj1026uAmA+gSlCjAud8Rc
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\R: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\V: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\Y: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\E: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\H: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\J: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\G: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\W: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\Z: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\P: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\Q: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\S: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\U: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\X: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\I: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\K: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\N: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\L: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\O: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe File opened (read-only) \??\T: f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\E-Set 2011\e-set.exe.tmp1 f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe -
Program crash 20 IoCs
pid pid_target Process procid_target 3928 4800 WerFault.exe 81 2164 4800 WerFault.exe 81 3136 4800 WerFault.exe 81 4784 4800 WerFault.exe 81 3644 4800 WerFault.exe 81 4916 4800 WerFault.exe 81 3332 4800 WerFault.exe 81 2852 4800 WerFault.exe 81 2528 4800 WerFault.exe 81 3484 4800 WerFault.exe 81 2436 4800 WerFault.exe 81 1348 4800 WerFault.exe 81 2580 4800 WerFault.exe 81 4796 4800 WerFault.exe 81 2716 4800 WerFault.exe 81 1548 4800 WerFault.exe 81 3420 4800 WerFault.exe 81 2628 4800 WerFault.exe 81 1232 4800 WerFault.exe 81 1408 4800 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4800 f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe 4800 f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe 4800 f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe 4800 f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe 4800 f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe 4800 f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe 4800 f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe 4800 f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f57a67f844f2d48d47b5f58a8b4f1f86_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 5522⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 5762⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 8962⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 8962⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 9602⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 9802⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 8962⤵
- Program crash
PID:3332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 10522⤵
- Program crash
PID:2852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 13202⤵
- Program crash
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 14802⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 15162⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 6442⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 16722⤵
- Program crash
PID:2580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 17482⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 17762⤵
- Program crash
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 17522⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 19922⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 10882⤵
- Program crash
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 12362⤵
- Program crash
PID:1232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 1402⤵
- Program crash
PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4800 -ip 48001⤵PID:2552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4800 -ip 48001⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4800 -ip 48001⤵PID:712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4800 -ip 48001⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4800 -ip 48001⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4800 -ip 48001⤵PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4800 -ip 48001⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4800 -ip 48001⤵PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4800 -ip 48001⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4800 -ip 48001⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4800 -ip 48001⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4800 -ip 48001⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4800 -ip 48001⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4800 -ip 48001⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4800 -ip 48001⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4800 -ip 48001⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4800 -ip 48001⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4800 -ip 48001⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4800 -ip 48001⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4800 -ip 48001⤵PID:3960