Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/09/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe
-
Size
292KB
-
MD5
f769f8680256dc4ad3d4a74a7158fd8e
-
SHA1
be63688d32cb7caf495f1438c953af59a7d9df5c
-
SHA256
083ac5d21291ceec80977589fd8a2f88a3146b63906558862fbee6500605fb8b
-
SHA512
976baa1b243b4613c6c0350c2264d62019f40d78e933101ef83796508c81c06998578cc485c9c24d07481e4e0dcae78c88abcb8f1da936fa0374f02eb5d952cd
-
SSDEEP
3072:j8Fz0avCfMlawqr4J/ps+pOQJq2V+u1p4Y3MRPbKA0kYIobfNivei5JmcktAIqzW:jG/V8VUq2Uu1paPWNBIQa/JmcCr
Malware Config
Extracted
formbook
3.8
sy
rawproteincoffee.com
railsjobbers.com
wzesi.com
seedsensei.com
verificationspurchase.com
hardware-fitting.com
roxanladiao.photography
mzanziwood.com
amazon-taiwan.com
scrypt-asic.com
liberationy.com
byhisgraceestate.com
servicedapartmentslondon.deals
firedup-foody.men
ccicfrance.com
ggfrtuyi788.com
jobbewerbung.online
therapuana.com
reuterservicescol.com
lydiaolsen.com
kshud.info
amcosmeticsbyamanamarleen.com
soyoungessentials.com
clarencescorner.info
939manbetx.com
buyerheadquarters.com
evernion.net
nesthomebuyer.info
dbw-online.com
nictoken.com
readysetreviews.com
flashback50.net
blitzkriegcontent.com
outbackjacks.net
xzmeisu.com
cells.ltd
rsmarfleet.com
cleansemethod.com
henancrzm.com
tiantiantaoyouhui11.com
programmingpalace.com
lilietlavie.com
corpsemakerfx.com
chfks.com
280man.com
battery-works.com
lasvapo.com
cocobaywonderland.com
bizmarkt.net
lxtoken.com
blackpersonbrand.com
sell-now-property-group.com
jiangkun.group
pelplin.info
fabimilk.net
zelfonderzoek.info
oaklandcabathroomremodeling.com
homografia.online
fairviewranch.net
elementfitnessltd.com
davemarchmusic.com
13x0.com
stockshowgear.com
quimicagenesis.com
mansiobbok.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4544-4-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Program crash 2 IoCs
pid pid_target Process procid_target 1684 4544 WerFault.exe 81 1600 4544 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4544 f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe 4544 f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4544 f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe 4544 f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4544 f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe 4544 f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4544 f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f769f8680256dc4ad3d4a74a7158fd8e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 9042⤵
- Program crash
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 9122⤵
- Program crash
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4544 -ip 45441⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4544 -ip 45441⤵PID:3104