Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 21:18
Behavioral task
behavioral1
Sample
14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
14f3b2a059c2efc4f7a9a63c95a5212a
-
SHA1
4c8d7c682b92f2170dd62ed16822151d3821f984
-
SHA256
0575d7e923398e2b2c7ee567b9217771f177ebf2cf97a3a8a3f088ed59e88484
-
SHA512
4f2b15b2d81a0eb97ae599c70387b20cbc092880ecaddf45bf0344f748718cecaae4c60284aa0ee92917cc106942002d95f3f585ef778777ec19488ea23ffccd
-
SSDEEP
24576:6XwnLf2QW/FoWp3HOEGH0CHSfnELCFIkG5OTEAHqqW:6XZxoWVuf0CHSfnE+Fr8zq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 556 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 556 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4312-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/memory/556-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00090000000233dc-11.dat upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4312 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4312 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe 556 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4312 wrote to memory of 556 4312 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe 82 PID 4312 wrote to memory of 556 4312 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe 82 PID 4312 wrote to memory of 556 4312 14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\14f3b2a059c2efc4f7a9a63c95a5212a_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD505e566dd48eedfda45e70c5316c0e597
SHA138fdef97a842102ac327910fa1203fc5795242fb
SHA2566063d5f00fb3035795b279109844ab1441c3cab43f4293bc2189403a2cc5cad7
SHA512e30b940f0b123e821af0d52fbd2f48def4d9fd639b3d26201c20b51181ea2a04a898ab9494a317ae25b505fec9eb317a0a0c447ce632d8afb592c4689e11c253