Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 03:07
Behavioral task
behavioral1
Sample
fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe
-
Size
123KB
-
MD5
fdae8a2fa0a40c823adfcff270b86516
-
SHA1
38ed6d94b25392cb43e2e9c1ac143d3831f409f6
-
SHA256
b3e1c93381cb5baa71fe115b5c5b6008e7a41a8cdd2126821b0c6925476b189c
-
SHA512
04726038e5b283f5203c4d945a030419acffc7256ba8be1f3df96ad32701b1b13ce7f932d80bb7f7de4ce5433f36ebd60a7440b14d72f5dc402247db801d6c95
-
SSDEEP
768:SuBqXCpLszRX+mzgFCipZw7RjMauxBAOK/2uxBAOK/1AiJyPCp05N3FnT:ZBqSpLsVXPcCGRxCOK/1xCOK/76NVnT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe -
Executes dropped EXE 3 IoCs
pid Process 3136 GaiaOnline Gold Granter.exe 1608 gaia gold server searcher.exe 632 gaia gold server bypasser.exe -
resource yara_rule behavioral2/memory/4992-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4992-31-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gaia gold server searcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gaia gold server bypasser.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4992 wrote to memory of 3136 4992 fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe 85 PID 4992 wrote to memory of 3136 4992 fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe 85 PID 4992 wrote to memory of 1608 4992 fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe 86 PID 4992 wrote to memory of 1608 4992 fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe 86 PID 4992 wrote to memory of 1608 4992 fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe 86 PID 4992 wrote to memory of 632 4992 fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe 87 PID 4992 wrote to memory of 632 4992 fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe 87 PID 4992 wrote to memory of 632 4992 fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fdae8a2fa0a40c823adfcff270b86516_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\GaiaOnline Gold Granter.exe"C:\Users\Admin\AppData\Local\Temp\GaiaOnline Gold Granter.exe"2⤵
- Executes dropped EXE
PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\gaia gold server searcher.exe"C:\Users\Admin\AppData\Local\Temp\gaia gold server searcher.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\gaia gold server bypasser.exe"C:\Users\Admin\AppData\Local\Temp\gaia gold server bypasser.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5ff94479fd616dd1569432e6de291352b
SHA16f25174c49eca86e7cd5ae669a9fa7bbb14456e2
SHA256d3c0d3c07addd9edf098d011bff6f9ed2193985d161da3c5100092a44d8a940b
SHA51257ed5a1ea517477dafc57c99ea747654797ac933cc77bfb32ccbbef2492a679361718b525ac4f037a9c96356b3affa0f2caff149a9510078fbcd27e9cb48b33e
-
Filesize
24KB
MD51772d750efe4723464b63e6d454f31ed
SHA116cd335bcd1718619d865e50a1b3f4e692d7ab28
SHA25645217507b0a8f8b69b2a15d713534329ad41bfc3241b3126e61dd9138ecdb7a1
SHA512879bbda26bd459b4e01d0d22b4e755269b86a99c30310c5a32ebc6f411040d4b39318a08a1cbf3d9697232d304407805943a98ca236656ab830ad949e5eea3fc
-
Filesize
24KB
MD58ddf4bc8ba51c97892e8d977af5f171a
SHA1b389b20a3510fa7acfc4c8e361c7311a665201bc
SHA2568f1dff0e3afdb3c815597f039999f7730a3893f580a19ceca9d5d5be20191923
SHA5120633121d2ecf3eb2298fa5618e2b2ab72568151b2f59a39d3e4bbb874e950ca77fd63317634fb9faa6b013e33d1c7ebb353b35dfda082a87aa7b0a351bbce870