Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe
-
Size
506KB
-
MD5
3d3e00fcc2f14a9e8ebb56b6c2d669cf
-
SHA1
2b83485a9356ba3a4e46a86e036e7bf6e9686f0a
-
SHA256
4d77a9fbd54d22aa9f144718e138964ab4e32b0d16e85fde4026b3182a15ebd0
-
SHA512
c5e521701351c203880b8aafc609ac9cb9e8f2798f895cfff43e1d160fe9e3bfa62823ec067773c05fa9d7d1b5c37309296113a756703ec2cc88c561798345b0
-
SSDEEP
12288:01GUsCOYBu9ORDI0jhaHdlgxrZt2QihmVH3OBzAz+4b:01GZlOZI0j89Y1cQpH+a+4b
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1912 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1912 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 12 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1912 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1912 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 1912 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 800 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 800 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 1912 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 800 wrote to memory of 1912 800 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 83 PID 800 wrote to memory of 1912 800 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 83 PID 800 wrote to memory of 1912 800 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 83 PID 1912 wrote to memory of 4072 1912 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 87 PID 1912 wrote to memory of 4072 1912 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 87 PID 1912 wrote to memory of 4072 1912 3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\3d3e00fcc2f14a9e8ebb56b6c2d669cf_JaffaCakes118.exe" /TN Google_Trk_Updater /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD53e19414c1b8df24e871a9a82769f8592
SHA1aa1aebccf389840bd2b354f1f3b674797fdf516e
SHA25614f781508e00b43407c1e9ddd30cecd75cad4f64d9b905e48fac36480c8bf11d
SHA5125e379bbee810fd0533fa591a1acc557e3be7bfdfa829c2ca8eafc3f61c35d3e8b3a049b27e6c8b43c4ba649f13845179267bb68c4256f28ee9f247e3ea391062