Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe
-
Size
178KB
-
MD5
36ca871f262c0a36429566696846f7c3
-
SHA1
9a06a82761bab7626f22f6d359de0f0bc7d8110d
-
SHA256
c552cd046602c1e054292a72ecfe9c3a201952800d9fc3b0b652ab610f059cbe
-
SHA512
147fb030beb80a9d5a3e9ecdd28722275f7d31467070dc411423363ee7a28f170aef388345d6a6af5a7a38b25414ae434b08e52be375d1551f0ad8647d4029ee
-
SSDEEP
3072:u0Gox2PD7tC6PNIk/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPxWqGU/n6CbzGcBIMHIGl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4544 Psycya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Psycya.exe 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Psycya.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Psycya.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe File created C:\Windows\Psycya.exe 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Psycya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\Main Psycya.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Internet Explorer\International Psycya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe 4544 Psycya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1272 wrote to memory of 4544 1272 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 86 PID 1272 wrote to memory of 4544 1272 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 86 PID 1272 wrote to memory of 4544 1272 36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\36ca871f262c0a36429566696846f7c3_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\Psycya.exeC:\Windows\Psycya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
178KB
MD536ca871f262c0a36429566696846f7c3
SHA19a06a82761bab7626f22f6d359de0f0bc7d8110d
SHA256c552cd046602c1e054292a72ecfe9c3a201952800d9fc3b0b652ab610f059cbe
SHA512147fb030beb80a9d5a3e9ecdd28722275f7d31467070dc411423363ee7a28f170aef388345d6a6af5a7a38b25414ae434b08e52be375d1551f0ad8647d4029ee
-
Filesize
390B
MD503fe087ab80ceef3f5ff8814816a24b5
SHA14557e4c82fab08471caf91c6df908000eecacb91
SHA256a3daaefdad589b89559e1aa1270d08e320fbd873329b9833677a0f0ed96c2c83
SHA5125e2cde58276cfbb71172299066f84961128882636b180b3f3697cf424813701fea4808d2f865e6da435039ee1595f6d4898f451dfd940e811e445c578ac0d96c