Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe
-
Size
146KB
-
MD5
f5ddfbc690027ada4818d3e6a69aa7e3
-
SHA1
ea760f631a0b20fe9daf11b33f47e2d043f57404
-
SHA256
3bf845ed70deb54e190a228e6aaf434f6bdd80d67542ebd5066b44212ce8cf2f
-
SHA512
630dadef348b160d5d7544c46867c732b710e17e8b2eb32117f52f57486be9b64b757ad198b4524d6f1aaaf610b95c046f17af61ea4ab365391393e5c6dae98b
-
SSDEEP
3072:wWm8HS0aGO6gfQtAZgB5TNgrJc3WE7I7gx:FG/QtA8IJcmwI7m
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4752 qijfj0tyots.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 3600 lr0dduvfqvd.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 3916 apocalyps32.exe -
resource yara_rule behavioral2/memory/3600-22-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000023471-21.dat upx behavioral2/memory/3916-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3916-37-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3916-32-0x0000000040010000-0x000000004004C000-memory.dmp upx behavioral2/memory/3600-30-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\apocalyps32.exe lr0dduvfqvd.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ File opened for modification C:\Windows\apocalyps32.exe lr0dduvfqvd.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ File created C:\Windows\apocalyps32.exe apocalyps32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr0dduvfqvd.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apocalyps32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 544 wrote to memory of 4752 544 f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe 82 PID 544 wrote to memory of 4752 544 f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe 82 PID 4752 wrote to memory of 3600 4752 qijfj0tyots.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 83 PID 4752 wrote to memory of 3600 4752 qijfj0tyots.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 83 PID 4752 wrote to memory of 3600 4752 qijfj0tyots.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 83 PID 3600 wrote to memory of 3916 3600 lr0dduvfqvd.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 84 PID 3600 wrote to memory of 3916 3600 lr0dduvfqvd.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 84 PID 3600 wrote to memory of 3916 3600 lr0dduvfqvd.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 84 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85 PID 3916 wrote to memory of 2460 3916 apocalyps32.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\qijfj0tyots.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$C:\Users\Admin\AppData\Local\Temp\qijfj0tyots.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\lr0dduvfqvd.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$C:\Users\Admin\AppData\Local\Temp\lr0dduvfqvd.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\apocalyps32.exe-bs4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:2460
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD57af4ec08a58cc1e024c0eb7c368cfbd1
SHA10691d44f5a8c9441878bc9decf65f7d22b124a40
SHA25656e54796089c9dc3d020405e4d9081b831a6aeb3360c3e1cbba4fdbee8619481
SHA51250b0956b62d3b3be124806cf4d5aea2b12375eeb2daef1857c5fb8be850ebdf776aafc6de87cbacd8b715b3e3d4a1b6e4b2a37f9602d28b729f012a1413a4d7d
-
Filesize
123KB
MD57aa244f62e806e0486d0b0606893dab3
SHA154c7814f1ec1a8b138dee4bdf0ccac19e36f462e
SHA256fd0f8cc3cc7b482d53d825916d47fc8a8d2d538856b105026ab735b2e26d643b
SHA512904aac24b6a8d4fa5223fe0700ca50958dc29a8a81be8783ef47674b2d1c7e0aa76cd38cb6c4dcf492cee612ee1ff026835690539353eb29b1f45a62103e6bd4