Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
fe638d70d202838bbe7c5150881440c0_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fe638d70d202838bbe7c5150881440c0_JaffaCakes118.exe
-
Size
604KB
-
MD5
fe638d70d202838bbe7c5150881440c0
-
SHA1
bb19150f3a051e3ec571b6970f0642e396facef0
-
SHA256
c668206001a869d1f5892c714c0e98a6d30825be04be48a0d50c85e080757cdc
-
SHA512
695aa99a55022e6bc431e551a52730ac028e781f3d6bf77dba53baf27e7ee3fa3e6d0033e31bad158bb9fe9dceeaacadfb1729e9e95b48b9bf5b9f3996e3b662
-
SSDEEP
12288:oiJ71uD99xQtmtPLETSNQPwAOl5L33hLF/tptve01PkxG0N/3XtV:L1kKKP6SNQYfz3VFlDe01PS3Xn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation fe638d70d202838bbe7c5150881440c0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 700 nono111.exe -
resource yara_rule behavioral2/files/0x0009000000023409-4.dat upx behavioral2/memory/700-10-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/700-13-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1900 700 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe638d70d202838bbe7c5150881440c0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nono111.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 640 wrote to memory of 700 640 fe638d70d202838bbe7c5150881440c0_JaffaCakes118.exe 82 PID 640 wrote to memory of 700 640 fe638d70d202838bbe7c5150881440c0_JaffaCakes118.exe 82 PID 640 wrote to memory of 700 640 fe638d70d202838bbe7c5150881440c0_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe638d70d202838bbe7c5150881440c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fe638d70d202838bbe7c5150881440c0_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\nono111.exe"C:\nono111.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 2883⤵
- Program crash
PID:1900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 700 -ip 7001⤵PID:3868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD5f5bb72a868bf30109ccd8a8d64d0a0f3
SHA190f91243788bb4dc1523502b9b9861bb8b867162
SHA2569b14e7f42ac94caf46fe04ee3705446e226f56253e2be65862f4d552a17d54a2
SHA5128e689e260dc85f79e9c6f5e73f3e55fb0271f81fa4b130f158d0258ed4c37e18c96f8c3aac24cf53e082463269af1e63169ee958167fc5a13a01f48a1d5fb782