Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe
-
Size
400KB
-
MD5
f6345e3b45591ab9a44d724c0ff8656d
-
SHA1
bf2174b48daeadb6066eabc1f518eeb510aee516
-
SHA256
a8fb90b6a1068f695e0ea092262e4a6085300e9f3dafc57da48bee837ec353a3
-
SHA512
63145c5bbb265dbcbe52698f7ef9cd3bc5ed43944a1abb7577286cdc94874e25164f1a19bf5376f37a22b579b7ee2ad7862b1d546a11045fd423e90bfc003c95
-
SSDEEP
6144:4jlYKRF/LReWAsUypbJmVYCdkssUoUdi9lruFvbj8h+V7PiA+mfWIDz51x8zN:4jauDReW74VHWIDz51eJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1936 oamlt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\oamlt.exe" oamlt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oamlt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 1936 4936 f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe 82 PID 4936 wrote to memory of 1936 4936 f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe 82 PID 4936 wrote to memory of 1936 4936 f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\ProgramData\oamlt.exe"C:\ProgramData\oamlt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD53ae7d9edfcef02abdb3e3da53fb3c9fd
SHA1a379758a4503f64a43f376006b330426d8a9c81c
SHA256fce98590a7ac93a352aed12a3e71783324f805175fb018f8dbdf1579fd3b76ab
SHA5125c5239caa3a622ce37b19a8afce838a3fb6c330bbdd6a9a3d778bda2d1afa1da59f4a11b21d8cf31ddbe3e3becf751ea60dd82f815a139ea02e3b08bf256a9b5
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
263KB
MD5b597ad67bd40b2f00abd84b7ec4aa313
SHA103abc6ec09d3ed9b4cedb32760567d9034112a1a
SHA25625c865dade39525301059a9f97c3bdd783b3e2f552eca0c97c9609180a63f1e1
SHA512989bcea7ae2fca0038e09ba6e5a8df080ccaa60e1554e22ff6f82a57444e95281350df8f95e9930404e7d203b9ca3b262117ab6b0eb4753a48e66b5fad8272ae