Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 16:04
Static task
static1
Behavioral task
behavioral1
Sample
fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe
-
Size
156KB
-
MD5
fca8193fd303f6ec04ba4124dec76006
-
SHA1
dde446cf9b7f42b06da6b6bb39bc3f8fd77de740
-
SHA256
9b08da5bb2d023a1dc162598ac12d5d155be88df5e9b694e29158ea218cb1e3f
-
SHA512
d3c25567061ee7a9efd4188b100f25c906f077c89f7f52a464526daa69604071187d48ef80e4765551577f67f16374b03f44e48ac61c66de2c89ea1ef89d1082
-
SSDEEP
3072:K2oOESvJHNpyAYzq5Zu441nAGkgv0TQDYJmKbgemPMMy4Ff7:ziSrpySwn6E0TQDYdbYPMMy4t
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4532 sxstrace.exe 1012 sxstrace.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxstrace.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxstrace.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 864 wrote to memory of 1844 864 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 82 PID 864 wrote to memory of 1844 864 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 82 PID 864 wrote to memory of 1844 864 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 82 PID 1844 wrote to memory of 4532 1844 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 83 PID 1844 wrote to memory of 4532 1844 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 83 PID 1844 wrote to memory of 4532 1844 fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe 83 PID 4532 wrote to memory of 1012 4532 sxstrace.exe 84 PID 4532 wrote to memory of 1012 4532 sxstrace.exe 84 PID 4532 wrote to memory of 1012 4532 sxstrace.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe" 5162⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\sxstrace.exe"C:\Users\Admin\AppData\Local\Temp\sxstrace.exe" {975B5B4C-63C4-4650-B301-0F59C937AE19} 2068 "C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\sxstrace.exe"C:\Users\Admin\AppData\Local\Temp\sxstrace.exe" {975B5B4C-63C4-4650-B301-0F59C937AE19} 2068 2292 "C:\Users\Admin\AppData\Local\Temp\fca8193fd303f6ec04ba4124dec76006_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD57831d7d772e3940f4d007b998eb19268
SHA12472a6c71860393f8e860a6eba99a35e9e1ca065
SHA256aaae19e6dc0c662ee065f1d670dbe9273d7da34a4660c61adef649f488b594aa
SHA5128f054816412e5db75b722b5d6b2830ec3ef302e2a6314027d2455d2eae728985c7db4d9e44f30bbcb740f1bf813a66eb597bcdd1c1e894e75a6071a599c4921a