Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe
-
Size
832KB
-
MD5
0c434ff66527df8a4e76a16945f1ff68
-
SHA1
1e45c9bc6acb7c97f1a7af8bdb6078c4295e47a7
-
SHA256
f559e2dc77db2285486d54e328d5d0043b82d08badbef450a22f48be333f4959
-
SHA512
90ff3a2697a323b9b6d4ab000cf50136e6f908ca47e9d2a52304b9e9b00d8bba09c2be3a1af469b59e82a0f41fb66e02c5ed9be477511010430785b73452154a
-
SSDEEP
12288:AuS+m1nBUtOcDvsEOh9UmYbd0AZXGkLjS/nhXamCLDy4uYlzlnoHY698EwUFN1L:7BSnBUtOcDvsimYxJw8LUJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4788 e5781b3.tmp -
Executes dropped EXE 2 IoCs
pid Process 4788 e5781b3.tmp 3276 0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5781b3.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3276 0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3864 wrote to memory of 4788 3864 0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe 82 PID 3864 wrote to memory of 4788 3864 0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe 82 PID 3864 wrote to memory of 4788 3864 0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe 82 PID 4788 wrote to memory of 3276 4788 e5781b3.tmp 83 PID 4788 wrote to memory of 3276 4788 e5781b3.tmp 83 PID 4788 wrote to memory of 3276 4788 e5781b3.tmp 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\e5781b3.tmp>C:\Users\Admin\AppData\Local\Temp\0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c434ff66527df8a4e76a16945f1ff68_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3276
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD50747cf0848425d7efc794ed0dfbbf9ae
SHA1b7b57e5e9eb4f71713eb2c70212359a5341db1cc
SHA25610729fd58582bb56dabc204b2b8dacf306148b8d92a346d60840b8b3959c8669
SHA512a552f254175a233bd26a496a5bcf0f066d78138a29d59f5ba1580454dfb8e634b1be5d7a463d6e82ba56a554cb7bcf57953e51ece6b56a1ccaf4149a8c4e8653
-
Filesize
832KB
MD50c434ff66527df8a4e76a16945f1ff68
SHA11e45c9bc6acb7c97f1a7af8bdb6078c4295e47a7
SHA256f559e2dc77db2285486d54e328d5d0043b82d08badbef450a22f48be333f4959
SHA51290ff3a2697a323b9b6d4ab000cf50136e6f908ca47e9d2a52304b9e9b00d8bba09c2be3a1af469b59e82a0f41fb66e02c5ed9be477511010430785b73452154a