Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe
-
Size
116KB
-
MD5
159a0a7bf6c1ee8085430cbf30d554fc
-
SHA1
d7d11f0e995f8c3c4e4e337d74be8546f1875ede
-
SHA256
9ad212c6a644a9a0b6b95fc0f554682a0bea61266f85875fcf31d2dbcfa26d46
-
SHA512
abbc8fe7e24f2a9d723c77696b1bc2be3a37e6a85c707644b7470614620f2698709890ae4b7ef3628b254d7662bd21c07b8463f4a237417b0ec1fbf9c6b3fb74
-
SSDEEP
3072:98RTVXDNJqxSA5HDc3I3nNoOsRXurRUQzj+5o/U:SZRcx5VMpOKXur2Qf+5o
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4632 Ubuzya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Ubuzya.exe 159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Ubuzya.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Ubuzya.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe File created C:\Windows\Ubuzya.exe 159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ubuzya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main Ubuzya.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\International Ubuzya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe 4632 Ubuzya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1240 wrote to memory of 4632 1240 159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe 82 PID 1240 wrote to memory of 4632 1240 159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe 82 PID 1240 wrote to memory of 4632 1240 159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\Ubuzya.exeC:\Windows\Ubuzya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
390B
MD544fbe35dcb674a3586138c566bf6b5a8
SHA172bda52a5c99a9e7164cab8a3682a695e568f795
SHA25656cdcaba29401a6b85f724535057fd52f4a0731f8217c33a8b068cbc7845c622
SHA512a9ad4492a06d63a59ecaa63c44eb5a3e083060106eb6c15f14aafa485a66b618d52664efd031a0e9f85eca0cbdd73a19228a2aca5ed40c16a0aff3fb74b0c651
-
Filesize
116KB
MD5159a0a7bf6c1ee8085430cbf30d554fc
SHA1d7d11f0e995f8c3c4e4e337d74be8546f1875ede
SHA2569ad212c6a644a9a0b6b95fc0f554682a0bea61266f85875fcf31d2dbcfa26d46
SHA512abbc8fe7e24f2a9d723c77696b1bc2be3a37e6a85c707644b7470614620f2698709890ae4b7ef3628b254d7662bd21c07b8463f4a237417b0ec1fbf9c6b3fb74