Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe
-
Size
20KB
-
MD5
02d5092fb652a56620ee9ab2c05d207e
-
SHA1
4043f69daf7533a5e9fa8d683f383b9b81d510c6
-
SHA256
f47aa90c4e52d300499a75b7298a9cdc7b1a9c09f2e1bdc99ae1e459e15467af
-
SHA512
e7064ea6f4745c5d97bacd62f1813e2785f67c71eac69863e3b74df1689f7f20a93e3574c9e341e429f115b63cbb87a1bfa992235ae26892fdc8992d0c53fb66
-
SSDEEP
384:h2/u3/70QZq6ttq2uYEgR0cno7AnSbbFH6xa9etCCJF9pEupKd4r:h2G3/BuYEoNnbUFa0hCP9mu2I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 928 1736 02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe 82 PID 1736 wrote to memory of 928 1736 02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe 82 PID 1736 wrote to memory of 928 1736 02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\b.bat "C:\Users\Admin\AppData\Local\Temp\02d5092fb652a56620ee9ab2c05d207e_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58B
MD526c4ec1c13398870f85d73138ea812db
SHA1d12a59f347a5e7e6c6290b154ee440d1f54351ce
SHA2565fa098b681456e794055c568e833b52620632c3fa3d0b3a24dcce7872a60319c
SHA51269cd63943a3b70a1915fdc7d02abeeadeb783549c6028ce1749f8d881acd707c7d9be9b0904760d1de7b157d12ee1bdc8ae6b0b1ab9bfe0ecb9fe27cf9f2c826