Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe
-
Size
411KB
-
MD5
14dcad3685454f8e5b6d6a720d25c102
-
SHA1
4cf23d414d7af197a02cd6dd30b5906ecb418933
-
SHA256
dbc9781b741c15fc3d2e619f988dc4c6e8eb19bf03b364c52cba42e867d8390f
-
SHA512
f9afe584401910594d361fa6d8c785de093c61d62e6776a97cd55dfe96de99cdd34aa98b2f1c07180eb33e543ebfc5dc58f4a01d9e5598af1a4a574cd4df8471
-
SSDEEP
6144:9GK72mmVAG1TMpolwHuN2iopMCEMozuAg1A:9phRmIUwHuN2iobEMfVq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3444 eTjq6onrIo5Ozw60.exe -
Executes dropped EXE 2 IoCs
pid Process 1360 eTjq6onrIo5Ozw60.exe 3444 eTjq6onrIo5Ozw60.exe -
Loads dropped DLL 4 IoCs
pid Process 2376 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 2376 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 3444 eTjq6onrIo5Ozw60.exe 3444 eTjq6onrIo5Ozw60.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\u6QQtdAcFi = "C:\\ProgramData\\P2cYL3RYEIQj\\eTjq6onrIo5Ozw60.exe" 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4048 set thread context of 2376 4048 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 82 PID 1360 set thread context of 3444 1360 eTjq6onrIo5Ozw60.exe 84 PID 3444 set thread context of 4804 3444 eTjq6onrIo5Ozw60.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eTjq6onrIo5Ozw60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eTjq6onrIo5Ozw60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4048 wrote to memory of 2376 4048 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 82 PID 4048 wrote to memory of 2376 4048 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 82 PID 4048 wrote to memory of 2376 4048 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 82 PID 4048 wrote to memory of 2376 4048 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 82 PID 4048 wrote to memory of 2376 4048 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 82 PID 2376 wrote to memory of 1360 2376 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 83 PID 2376 wrote to memory of 1360 2376 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 83 PID 2376 wrote to memory of 1360 2376 14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe 83 PID 1360 wrote to memory of 3444 1360 eTjq6onrIo5Ozw60.exe 84 PID 1360 wrote to memory of 3444 1360 eTjq6onrIo5Ozw60.exe 84 PID 1360 wrote to memory of 3444 1360 eTjq6onrIo5Ozw60.exe 84 PID 1360 wrote to memory of 3444 1360 eTjq6onrIo5Ozw60.exe 84 PID 1360 wrote to memory of 3444 1360 eTjq6onrIo5Ozw60.exe 84 PID 3444 wrote to memory of 4804 3444 eTjq6onrIo5Ozw60.exe 85 PID 3444 wrote to memory of 4804 3444 eTjq6onrIo5Ozw60.exe 85 PID 3444 wrote to memory of 4804 3444 eTjq6onrIo5Ozw60.exe 85 PID 3444 wrote to memory of 4804 3444 eTjq6onrIo5Ozw60.exe 85 PID 3444 wrote to memory of 4804 3444 eTjq6onrIo5Ozw60.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14dcad3685454f8e5b6d6a720d25c102_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\ProgramData\P2cYL3RYEIQj\eTjq6onrIo5Ozw60.exe"C:\ProgramData\P2cYL3RYEIQj\eTjq6onrIo5Ozw60.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\ProgramData\P2cYL3RYEIQj\eTjq6onrIo5Ozw60.exe"C:\ProgramData\P2cYL3RYEIQj\eTjq6onrIo5Ozw60.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" /i:34445⤵PID:4804
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD50b52e22d1d38c8f94ceda244618c38ce
SHA1b2bc0d3e92ece950e0d63911cce45062d2a8dd43
SHA256f3e794201895ad6bbe39c38d5add1774b6a07465b4a91981061a13e3f3281a11
SHA51263fb62130d67543b6c94afd6c7aa48514decc9c59fdc2b0dae9c5902471848b55716f569b5b0a0d98aeeee311b610b498518508981fe0bcbab8cc4ea6eae2da1
-
Filesize
411KB
MD514dcad3685454f8e5b6d6a720d25c102
SHA14cf23d414d7af197a02cd6dd30b5906ecb418933
SHA256dbc9781b741c15fc3d2e619f988dc4c6e8eb19bf03b364c52cba42e867d8390f
SHA512f9afe584401910594d361fa6d8c785de093c61d62e6776a97cd55dfe96de99cdd34aa98b2f1c07180eb33e543ebfc5dc58f4a01d9e5598af1a4a574cd4df8471