Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe
-
Size
218KB
-
MD5
119b57bab0e7f76b68d24c3efec9031b
-
SHA1
2d88f79e28ed8411e9b586072c8e172fab880a2b
-
SHA256
f550aec5e8956305d5679e22df073099ddcc67ae6f8f8ce35f16f2768a70762d
-
SHA512
55e1ea27c0087688f25e1cc6067b54f9719f3310343f780e47534da7813954076d9e8dd7dc3da0427542ff0b626ef3f2eb2e318c74c036cde65da138542ace38
-
SSDEEP
3072:OwR5g46PJhr+dXwfFC1rDbXCxYqN/GXwPQlLl4V1oxYBBvB7VFCGWgLA9ovkNGqx:/R2zP+yfFCJDT2b/FQlS9Z7zfLwlQsF1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3460 32.exe 232 QvodSetupPlus3.exe -
resource yara_rule behavioral2/files/0x000a00000002347e-13.dat upx behavioral2/memory/232-19-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-22-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-23-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-24-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-25-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-27-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-28-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-30-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-32-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-33-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral2/memory/232-35-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3836 3460 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QvodSetupPlus3.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 232 QvodSetupPlus3.exe 232 QvodSetupPlus3.exe 232 QvodSetupPlus3.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 232 QvodSetupPlus3.exe 232 QvodSetupPlus3.exe 232 QvodSetupPlus3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4336 wrote to memory of 3460 4336 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 82 PID 4336 wrote to memory of 3460 4336 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 82 PID 4336 wrote to memory of 3460 4336 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 82 PID 4336 wrote to memory of 232 4336 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 83 PID 4336 wrote to memory of 232 4336 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 83 PID 4336 wrote to memory of 232 4336 119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\119b57bab0e7f76b68d24c3efec9031b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\32.exe"C:\Users\Admin\AppData\Local\Temp\32.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 2363⤵
- Program crash
PID:3836
-
-
-
C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.exe"C:\Users\Admin\AppData\Local\Temp\QvodSetupPlus3.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3460 -ip 34601⤵PID:1916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5bfe6737ba6596a5fdf2a049e2173cddc
SHA17da5eee868fe5b852f6abb932da4af8d4d63eeaf
SHA25601dc2e67b874b3a40cd5f06aac4c64313182817da5f5049059e02d1d88d5e1ec
SHA512e09d9f9e774efc78d7c432a836e439d5613733be058498eae8bca6e41bbec6705c1010dc993c65f84bebf5cb53d9f2af7fde89de7cd8f0509901ca4d1c9d92e2
-
Filesize
149KB
MD57d5ce902a450ed732377cedc8fd69ed3
SHA11032e0f88a6224d08b342b145adc753b3b5de7b9
SHA256ce357b4fad92329cc26793198d839ea3c5f8f132fd7b6f76a2778d455a1e8ec4
SHA512e54684c8645ef307b3dc77bad6c863da7dea4aab9caeb47f3087743e331dde03b462154a1a5e2f54aee0807abad81fa5685e586bed15d7750a5f7dd9556258c1