Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe
-
Size
17KB
-
MD5
f5e1567cf5a6df4fcd7dbc3e94bbc2d3
-
SHA1
e0f7d2b16bee17ea7738dbb44c8db71e2c311c36
-
SHA256
d521465c366b19889c43f31b498105cd6bf0f3e3206ff787ebfb11f679fcc4e7
-
SHA512
20709f97d50639a28653627ca2031eefed57d11a531dc112ed393b2eadf94448ab66cc814124f87313da53f9cbe16ac4dab8bd3c197ecb50055f367b78370ea2
-
SSDEEP
384:yLDLsy4PXGxuTIo9WIRQhN2nBoK9XqYHfc85M2Pu0V:yLDLsRlTIdN2nBoCqqfcY7Pu0V
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4736 regsvr32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Sotfone\1727262696.dll f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4696 4736 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2900 wrote to memory of 4736 2900 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 82 PID 2900 wrote to memory of 4736 2900 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 82 PID 2900 wrote to memory of 4736 2900 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 82 PID 2900 wrote to memory of 4108 2900 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 86 PID 2900 wrote to memory of 4108 2900 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 86 PID 2900 wrote to memory of 4108 2900 f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f5e1567cf5a6df4fcd7dbc3e94bbc2d3_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files (x86)\Sotfone\1727262696.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 6123⤵
- Program crash
PID:4696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\tempdel.bat2⤵
- System Location Discovery: System Language Discovery
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4736 -ip 47361⤵PID:1848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD559150b4d1e8919de425493e63accf9bc
SHA11ad3c783c1fa37bdf78f5a838c3f0425ac9347c5
SHA256df0800133950e16e92b311822014011c3fd4b7b7890833db3d15464ba991c4c7
SHA512b792fde716348bc299c03c6476728ea5497ba067add9566791656abd5ea2ef59a92618262b84e4e0ad62e95a4fe21f16c87f180bf63d9486d44afb7be23df6b2
-
Filesize
232B
MD559b34c53026b8a6e3a50dbbf5f63651c
SHA109cb3706dc04200226c966a3f76af98ee80fa15e
SHA25678528623a7b07a3d657ec3e60089137559debd4dfa607eacdf81978d0e246cb7
SHA5124ae2275c841d1e7c213748c145a1baa173fad7d074be9bc25d5b9c2aad361f714ef8494e027a7df029bb832a1b81b44928fc85e58523650ccacc959d808e8712