Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe
-
Size
15KB
-
MD5
29806262f2866ad3834e4d5856f4b198
-
SHA1
393940584268acc11b92498591b125ec5a3f39b5
-
SHA256
cb0cb5250c490f9ef86765e509f7eed24e094bbccd7682290ee8ba216a293ec0
-
SHA512
6fb6ccd48ae0588b048a7d4c7d2c591b4cbecf7448820681380b21802bd613423fa68ea21e97ba2cb88a59ff50cc13c5f192d2d8370fb7c003fa1ae4c145b2ef
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYQMxA:hDXWipuE+K3/SSHgxmHa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation DEM809A.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation DEMD6F7.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation DEM2D45.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation DEM82D7.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation DEMD8C7.exe -
Executes dropped EXE 6 IoCs
pid Process 2912 DEM809A.exe 436 DEMD6F7.exe 4836 DEM2D45.exe 5008 DEM82D7.exe 1680 DEMD8C7.exe 3376 DEM2ED6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM809A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMD6F7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM2D45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM82D7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMD8C7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM2ED6.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5028 wrote to memory of 2912 5028 29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe 87 PID 5028 wrote to memory of 2912 5028 29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe 87 PID 5028 wrote to memory of 2912 5028 29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe 87 PID 2912 wrote to memory of 436 2912 DEM809A.exe 92 PID 2912 wrote to memory of 436 2912 DEM809A.exe 92 PID 2912 wrote to memory of 436 2912 DEM809A.exe 92 PID 436 wrote to memory of 4836 436 DEMD6F7.exe 94 PID 436 wrote to memory of 4836 436 DEMD6F7.exe 94 PID 436 wrote to memory of 4836 436 DEMD6F7.exe 94 PID 4836 wrote to memory of 5008 4836 DEM2D45.exe 96 PID 4836 wrote to memory of 5008 4836 DEM2D45.exe 96 PID 4836 wrote to memory of 5008 4836 DEM2D45.exe 96 PID 5008 wrote to memory of 1680 5008 DEM82D7.exe 98 PID 5008 wrote to memory of 1680 5008 DEM82D7.exe 98 PID 5008 wrote to memory of 1680 5008 DEM82D7.exe 98 PID 1680 wrote to memory of 3376 1680 DEMD8C7.exe 100 PID 1680 wrote to memory of 3376 1680 DEMD8C7.exe 100 PID 1680 wrote to memory of 3376 1680 DEMD8C7.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29806262f2866ad3834e4d5856f4b198_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\DEM809A.exe"C:\Users\Admin\AppData\Local\Temp\DEM809A.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\DEMD6F7.exe"C:\Users\Admin\AppData\Local\Temp\DEMD6F7.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\DEM2D45.exe"C:\Users\Admin\AppData\Local\Temp\DEM2D45.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\DEM82D7.exe"C:\Users\Admin\AppData\Local\Temp\DEM82D7.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\DEMD8C7.exe"C:\Users\Admin\AppData\Local\Temp\DEMD8C7.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\DEM2ED6.exe"C:\Users\Admin\AppData\Local\Temp\DEM2ED6.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3376
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD57f9026fceaee43db517e219b150b2671
SHA12148212de01fca95f34868471de09acc25f7c8ec
SHA25655c9f1001796333ae9a395a956a82a06595f0e63f96f8235dc1129e498ac2887
SHA512dd075b9ef4be856c6afcd1a15e9cd986ab1f8f21428da45fe20f8f2868bf24b07fe8392c81870f48a3dd99f944451d063becc0c33f4317d629b2fb7a97939372
-
Filesize
15KB
MD5e5dc471d604df739acc1030c24931d73
SHA12c09a1cf52dd7c74e6df26d4b94ba85a1091efe7
SHA256456c76342fb6902cecf29d7b5867e56f0dc0606fd9988dbeff3d9c507f563358
SHA512ba22ce02ba3da58b79b65e030f743e6907eec2342736a6c953f231eb8c559c239304468842715a6f1e8386f5c1dde8d2917d27342e85288b3bf23cb444a025ed
-
Filesize
15KB
MD58abb0cc0c659bb61a6d8cee4fcb71497
SHA1026d4eaf92a79d0ecbde07a005abb1d4a9ab8556
SHA256a0e31a677bb4e60367af07f6f3461241b23b95fcb1a3e7507f4ad9aa61f68e92
SHA512c23673d7d489b5cf763744c38936ab06d2645afef2ebfc46d90fac4ce4e70a0fd14f056994c7b902a498abe606fcc921181f1eaf111551f9ab58bd72fc718fe1
-
Filesize
15KB
MD513157dfdfd294155f37000b684970d43
SHA1b63c799b4a5d7f9460bffcabc6e4b56d385863c8
SHA256860fafac23c88d95a8c08c390580a95fbb1557215ead4384e6ebf8b61955f03b
SHA512337030c19fcfb220dc33c34f54567e430ef9d0618f20a4d8bf942d1739467384256cb0e9ac6c0d35b350c0ae35cabe5439002e9afcc5ff6ae09c0ef97b1478cd
-
Filesize
15KB
MD58f557668ece6527eb46448f71a21d676
SHA1223a8a510b85ae81dbc1b4d4fee5bd8e2494f80a
SHA2565e71c8bd65a980d34441309d629ad1697864e6bfc31ab4dfd063af836b6abaf1
SHA512390453e6315b00fcca3227464fb4696b182ba435be3b6ef57af8fe2b2f392ef5899a06719d714fc95bfda553b80401130d846e9670fe23fd8d66ce24f2ddce2e
-
Filesize
15KB
MD5da8f89e8e4b6e8f8b306a47a0d268c9e
SHA12a8b92f2b5f8749fca95775842a9c56501d93c8f
SHA256422738bc1a17c84fed6dbbaa86f03c76c7fcf8df53527cff353085b76688db99
SHA5120157dc4b9f986de36618398594af9dd21ed8a42f377adb552ccab718f48c84f97f097b853650776269b44bb933584cf2f2dfa7f60db5c448691e2f4899d705bd