Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
53f72f13b6e...18.exe
windows7-x64
33f72f13b6e...18.exe
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3Alawar.url
windows7-x64
6Alawar.url
windows10-2004-x64
3HTMLayout.dll
windows7-x64
3HTMLayout.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 10:55
Behavioral task
behavioral1
Sample
3f72f13b6e2369b55ab89ee2cdfadc67_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f72f13b6e2369b55ab89ee2cdfadc67_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Alawar.url
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Alawar.url
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
HTMLayout.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
HTMLayout.dll
Resource
win10v2004-20241007-en
General
-
Target
3f72f13b6e2369b55ab89ee2cdfadc67_JaffaCakes118.exe
-
Size
9.1MB
-
MD5
3f72f13b6e2369b55ab89ee2cdfadc67
-
SHA1
d94403a6b06a6051dfe557b48a2cd0b2280cca78
-
SHA256
812d454fdc3b18421f6fd74ab9d1574e7be731b442fd956826c14548845ab0fc
-
SHA512
f0d7ac847f20d75241098d58f99262c50d66377d76c02340d8caa298264f198cfbabbd5dcfc2278c34c1f9b8614822f6fa17c253e0fba114f19ce088c5b587c8
-
SSDEEP
196608:Ai43FcI+2Pof43X+NNe0mitWbjjqT4y2U50rpozEBDHm44t+syg0VM9hy:tkcI+1f6XSmitwiT4Eiv5GvbA+hy
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f72f13b6e2369b55ab89ee2cdfadc67_JaffaCakes118.exe