Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
4s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
14e1b86795bea4573f3dc5b55507458e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14e1b86795bea4573f3dc5b55507458e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
14e1b86795bea4573f3dc5b55507458e_JaffaCakes118.exe
-
Size
20KB
-
MD5
14e1b86795bea4573f3dc5b55507458e
-
SHA1
b54d8c641b798e98e37d4a44845fd559573edf04
-
SHA256
6c403eb70efdb6044743fd319fee343695dd94c5d1b89de05fc4636d48da658e
-
SHA512
12c4b0b3e6692318e43eba9d66a342ed234343cd6a29fe2bacfaa8303b03f6c4684cacff3625c4403d7bb6d29f555b880fdce915b4806c6d6ec5fbfa4851c9d2
-
SSDEEP
96:/lxc6A5bKvLBakA1HJEKra8hBhqvchXmPXsGAVmEy2:/TQ5buBNA7dra2qSq88Ey
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14e1b86795bea4573f3dc5b55507458e_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 2504 Process not Found 4252 Process not Found 980 Process not Found 4904 Process not Found 2888 Process not Found 4284 Process not Found 1552 Process not Found 4796 Process not Found 4468 Process not Found 4940 Process not Found 560 Process not Found 472 Process not Found 3220 Process not Found 2172 Process not Found 3372 Process not Found 1812 Process not Found 4616 Process not Found 2060 Process not Found 3664 Process not Found 3856 Process not Found 3740 Process not Found 4980 Process not Found 1260 Process not Found 2644 Process not Found 4532 Process not Found 2760 Process not Found 3196 Process not Found 5092 Process not Found 184 Process not Found 4144 Process not Found 2128 Process not Found 4908 Process not Found 1584 Process not Found 2824 Process not Found 1756 Process not Found 3288 Process not Found 3504 Process not Found 1948 Process not Found 436 Process not Found 4672 Process not Found 4184 Process not Found 4884 Process not Found 2756 Process not Found 1828 Process not Found 3056 Process not Found 1676 Process not Found 320 Process not Found 1944 Process not Found 1460 Process not Found 5068 Process not Found 4536 Process not Found 396 Process not Found 2836 Process not Found 3188 Process not Found 4680 Process not Found 1776 Process not Found 1016 Process not Found 2948 Process not Found 2776 Process not Found 4944 Process not Found 4200 Process not Found 2532 Process not Found 1692 Process not Found 3324 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4696 14e1b86795bea4573f3dc5b55507458e_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14e1b86795bea4573f3dc5b55507458e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14e1b86795bea4573f3dc5b55507458e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4696
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1380
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3792
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3960
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3316
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2720
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:640
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:3588
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:2740