Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe
-
Size
19KB
-
MD5
3caa54444e29063eb3e316ba20ca9e83
-
SHA1
2ce5d9186b70d77808115e2cd2df3a5d09a59b90
-
SHA256
7ca4e6020511294fcfcf503eb985db51513fa8fa294f45ef7112fd061acd7955
-
SHA512
1155ccdc913b55a7ab444ab20441c5522e89fc705a35790ca84c9c1193d97262a1b1b489d392e0c31b84ff916fba02b269e4f3944bfea0d443ec16e764f17ffe
-
SSDEEP
384:jxNR77zN0w638TNFTBs16QCzOcg9FgGJV4EFdYHuwETKUgPZ9bMt5vAxVqxkeOlS:jxN17zn66W2zONFgS4aay
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Reiniger.bat cmd.exe File opened for modification C:\Windows\Reiniger.bat cmd.exe File created C:\Windows\Reiniger.vbs cmd.exe File opened for modification C:\Windows\Reiniger.vbs cmd.exe File opened for modification C:\Windows\win.ini cmd.exe File created C:\Windows\rs.reg cmd.exe File opened for modification C:\Windows\rs.reg cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4080 wrote to memory of 688 4080 3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe 83 PID 4080 wrote to memory of 688 4080 3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe 83 PID 4080 wrote to memory of 688 4080 3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe 83 PID 688 wrote to memory of 3008 688 cmd.exe 85 PID 688 wrote to memory of 3008 688 cmd.exe 85 PID 688 wrote to memory of 3008 688 cmd.exe 85 PID 688 wrote to memory of 2008 688 cmd.exe 86 PID 688 wrote to memory of 2008 688 cmd.exe 86 PID 688 wrote to memory of 2008 688 cmd.exe 86 PID 688 wrote to memory of 2072 688 cmd.exe 87 PID 688 wrote to memory of 2072 688 cmd.exe 87 PID 688 wrote to memory of 2072 688 cmd.exe 87 PID 688 wrote to memory of 1268 688 cmd.exe 89 PID 688 wrote to memory of 1268 688 cmd.exe 89 PID 688 wrote to memory of 1268 688 cmd.exe 89 PID 688 wrote to memory of 1048 688 cmd.exe 90 PID 688 wrote to memory of 1048 688 cmd.exe 90 PID 688 wrote to memory of 1048 688 cmd.exe 90 PID 688 wrote to memory of 4624 688 cmd.exe 91 PID 688 wrote to memory of 4624 688 cmd.exe 91 PID 688 wrote to memory of 4624 688 cmd.exe 91 PID 688 wrote to memory of 2484 688 cmd.exe 92 PID 688 wrote to memory of 2484 688 cmd.exe 92 PID 688 wrote to memory of 2484 688 cmd.exe 92 PID 688 wrote to memory of 1008 688 cmd.exe 93 PID 688 wrote to memory of 1008 688 cmd.exe 93 PID 688 wrote to memory of 1008 688 cmd.exe 93 PID 688 wrote to memory of 2040 688 cmd.exe 96 PID 688 wrote to memory of 2040 688 cmd.exe 96 PID 688 wrote to memory of 2040 688 cmd.exe 96 PID 4080 wrote to memory of 1916 4080 3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe 97 PID 4080 wrote to memory of 1916 4080 3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe 97 PID 4080 wrote to memory of 1916 4080 3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3caa54444e29063eb3e316ba20ca9e83_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat""2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver"3⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\find.exefind /i "XP"3⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" if errorlevel1 ctty nul | if not errorlevel1 exit"3⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\SysWOW64\find.exefind /v /i "[windows]"3⤵
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Windows\SysWOW64\find.exefind /v /i "load="3⤵
- System Location Discovery: System Language Discovery
PID:1048
-
-
C:\Windows\SysWOW64\find.exefind /v /i "run="3⤵
- System Location Discovery: System Language Discovery
PID:4624
-
-
C:\Windows\SysWOW64\find.exefind /v /i "NullPort="3⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 mouse,disable3⤵
- System Location Discovery: System Language Discovery
PID:1008
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 keyboard,disable3⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD523cf8138f49416231807e6de371fb9e6
SHA1973672eeae5a05447e47395cde37e8121b7c90fe
SHA2566b3d6e268dcb76e175a7db3d9e031349ab2c32654c7e57581a851e64dd6214ab
SHA51242ae18a96645289cb0246d545daa955d2fb0784993726414d0bc723dfb58b33cf11bb6b62ba7f5a3765e0c6c5713e8a02cd63638877ca032b82d4806e79950cf
-
Filesize
5KB
MD508ba7299e46ff5ce240cc4443f978254
SHA1962bcaf1a40c9e64ce4255304308a45415307108
SHA256694bec51824f93182e9a88eca05c8d5d12709c657e176799747f45c39f259da9
SHA512a8012d1f46ca28b04bbdf104904de437d4ceca992d4d0a9094b2d1094c7ad0f05612668727a85a33593acf7b2fb7d8d01b578ca56fd9bd30c69eb20eb2a82389
-
Filesize
146B
MD588381f6a43477c19636c8c4a3507467b
SHA1ee5b1692a1e2cdaab427ee6b439a3863af194c7a
SHA25643f4d0929ad9829357a007818d770887a8985ee09ddb8b2dd1df240deeaf5a0a
SHA5129693b61fa6d89044870be79376f8423447fc0f9ba1d2c99352a19f2b246901cfd7fd36d0f549f269d01131ff2f8b7d6a8864e723278c2d0ac61e72c0e3c12b25