Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 04:56 UTC
Static task
static1
Behavioral task
behavioral1
Sample
163e8df577ef8722e408912466367f50_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
163e8df577ef8722e408912466367f50_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
163e8df577ef8722e408912466367f50_JaffaCakes118.exe
-
Size
514KB
-
MD5
163e8df577ef8722e408912466367f50
-
SHA1
9df6fd0508a900bbf6213b4b0529ad7b2a84bfe7
-
SHA256
2fd7ba0ea36b5087c441662ba65f8c0fce99e8881df66223bddf147ed6fe2440
-
SHA512
e024a5a1431d0c3a44c1d89910ad793dd4c2c6b048c300028bd7b997153dcf54246ad7bdac78806b0015631380d4c153486f58b7d76f7eb1370995cff6651fda
-
SSDEEP
6144:st9sTEcg7/EpK3ee4wgv3KN+xIISYswjAel0bQz9iRSZkB3Ju/H:s6Dg7cnwgv3xxdhYoZklJuP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1852 eXHN9FiJJ05Uk3kM.exe -
Executes dropped EXE 2 IoCs
pid Process 4200 eXHN9FiJJ05Uk3kM.exe 1852 eXHN9FiJJ05Uk3kM.exe -
Loads dropped DLL 4 IoCs
pid Process 4768 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 4768 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 1852 eXHN9FiJJ05Uk3kM.exe 1852 eXHN9FiJJ05Uk3kM.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\09aDN597BUG12yG = "C:\\ProgramData\\npSdTjUNfCjePP8Z\\eXHN9FiJJ05Uk3kM.exe" 163e8df577ef8722e408912466367f50_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4492 set thread context of 4768 4492 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 82 PID 4200 set thread context of 1852 4200 eXHN9FiJJ05Uk3kM.exe 84 PID 1852 set thread context of 3480 1852 eXHN9FiJJ05Uk3kM.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 163e8df577ef8722e408912466367f50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 163e8df577ef8722e408912466367f50_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eXHN9FiJJ05Uk3kM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eXHN9FiJJ05Uk3kM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VSTOInstaller.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4492 wrote to memory of 4768 4492 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 82 PID 4492 wrote to memory of 4768 4492 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 82 PID 4492 wrote to memory of 4768 4492 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 82 PID 4492 wrote to memory of 4768 4492 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 82 PID 4492 wrote to memory of 4768 4492 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 82 PID 4768 wrote to memory of 4200 4768 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 83 PID 4768 wrote to memory of 4200 4768 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 83 PID 4768 wrote to memory of 4200 4768 163e8df577ef8722e408912466367f50_JaffaCakes118.exe 83 PID 4200 wrote to memory of 1852 4200 eXHN9FiJJ05Uk3kM.exe 84 PID 4200 wrote to memory of 1852 4200 eXHN9FiJJ05Uk3kM.exe 84 PID 4200 wrote to memory of 1852 4200 eXHN9FiJJ05Uk3kM.exe 84 PID 4200 wrote to memory of 1852 4200 eXHN9FiJJ05Uk3kM.exe 84 PID 4200 wrote to memory of 1852 4200 eXHN9FiJJ05Uk3kM.exe 84 PID 1852 wrote to memory of 3480 1852 eXHN9FiJJ05Uk3kM.exe 85 PID 1852 wrote to memory of 3480 1852 eXHN9FiJJ05Uk3kM.exe 85 PID 1852 wrote to memory of 3480 1852 eXHN9FiJJ05Uk3kM.exe 85 PID 1852 wrote to memory of 3480 1852 eXHN9FiJJ05Uk3kM.exe 85 PID 1852 wrote to memory of 3480 1852 eXHN9FiJJ05Uk3kM.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\163e8df577ef8722e408912466367f50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\163e8df577ef8722e408912466367f50_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\163e8df577ef8722e408912466367f50_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\163e8df577ef8722e408912466367f50_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\ProgramData\npSdTjUNfCjePP8Z\eXHN9FiJJ05Uk3kM.exe"C:\ProgramData\npSdTjUNfCjePP8Z\eXHN9FiJJ05Uk3kM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\ProgramData\npSdTjUNfCjePP8Z\eXHN9FiJJ05Uk3kM.exe"C:\ProgramData\npSdTjUNfCjePP8Z\eXHN9FiJJ05Uk3kM.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe" /i:18525⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
-
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestc.g3log.com.brIN AResponse
-
Remote address:8.8.8.8:53Requestc.g3log.com.brIN A
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request75.117.19.2.in-addr.arpaIN PTRResponse75.117.19.2.in-addr.arpaIN PTRa2-19-117-75deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
132 B 90 B 2 1
DNS Request
8.8.8.8.in-addr.arpa
DNS Request
8.8.8.8.in-addr.arpa
-
146 B 147 B 2 1
DNS Request
217.106.137.52.in-addr.arpa
DNS Request
217.106.137.52.in-addr.arpa
-
219 B 144 B 3 1
DNS Request
240.221.184.93.in-addr.arpa
DNS Request
240.221.184.93.in-addr.arpa
DNS Request
240.221.184.93.in-addr.arpa
-
120 B 120 B 2 1
DNS Request
c.g3log.com.br
DNS Request
c.g3log.com.br
-
71 B 157 B 1 1
DNS Request
0.159.190.20.in-addr.arpa
-
146 B 144 B 2 1
DNS Request
95.221.229.192.in-addr.arpa
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
210 B 144 B 3 1
DNS Request
18.31.95.13.in-addr.arpa
DNS Request
18.31.95.13.in-addr.arpa
DNS Request
18.31.95.13.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
154.239.44.20.in-addr.arpa
DNS Request
154.239.44.20.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
75.117.19.2.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
13.227.111.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD5e072f64684d74a7889a71014a2eab51d
SHA12a5b8486d385b22f4351ea68540f8838979347bc
SHA256b5b199986ad28928e641186dbe1e499de9bb15fe0a792cf4d1e4e74eb37878be
SHA5121b2372455e2a1b6fc2eecc86b5e4768d28d140f43e4d29df6f82d1eac273cb6a1b195579d721798d5f420ce1d8c8c85885f3e39fb9e6570dcf880c13490deace
-
Filesize
514KB
MD5163e8df577ef8722e408912466367f50
SHA19df6fd0508a900bbf6213b4b0529ad7b2a84bfe7
SHA2562fd7ba0ea36b5087c441662ba65f8c0fce99e8881df66223bddf147ed6fe2440
SHA512e024a5a1431d0c3a44c1d89910ad793dd4c2c6b048c300028bd7b997153dcf54246ad7bdac78806b0015631380d4c153486f58b7d76f7eb1370995cff6651fda