Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe
-
Size
112KB
-
MD5
12ff4dd5e22adb09c5c55e0a5f93b8dc
-
SHA1
de65bea0c38cef055b154f2d84ab07566c320a2c
-
SHA256
7b96ba5193e18837bd85b5512c3a06cf5b466ce87892a2e4162ad42c7d4ac8c4
-
SHA512
75379d3eec63115a39262676c34abdb71a7790159de8a567d50cd911fc971f8ddee15486de1ca4a6938f3241ee46fa9892000dd810c0126ddfa503149c9b56d2
-
SSDEEP
1536:8a2YTof5Rm7lOdClmPk1q8n/XJJMkPXXWzxteuxshc9E:8DSZ7lOdLkPnPJJczxteuxyF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4920 CRFSELFEX.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CRFSELFEX.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4840 wrote to memory of 4920 4840 12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe 84 PID 4840 wrote to memory of 4920 4840 12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe 84 PID 4840 wrote to memory of 4920 4840 12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\CRFSELFEX.exe"C:\Users\Admin\AppData\Local\Temp\CRFSELFEX.exe" "C:\Users\Admin\AppData\Local\Temp\12ff4dd5e22adb09c5c55e0a5f93b8dc_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5900cc5da3d5c52cdd9ae7d986b15ad7d
SHA1faace5b9874857cde95afc556f97ec787a6ffb5e
SHA25669ed8bceac416c3d1863cfbb317856702e06160e5a29db82227c1bf4366cb3be
SHA512b515d61ab7a6f5126a4ca78ecbe18bac8a3342c3e1106d500aa7c37c24eef1bbfb62f6580b162c7ce5bec7c153f1698307ac2427942e422b03765defc7c44044