Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 14:16
Static task
static1
Behavioral task
behavioral1
Sample
404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe
-
Size
848KB
-
MD5
404f53ed2aa790c9986cbac778fc0801
-
SHA1
4198e3a27b60c996fb93b577320a466080a75019
-
SHA256
db5be5a732b104239376559456414ad75a4388d2bf84dbf2b4f0472bb9538a5e
-
SHA512
792268932fe0c15dc58770a11700e62abf26260d232413c59f2509ba6620ffc1f63f0baf85e0bc68287fffef6a2f69c75163f8f3fb7c2b012c8c187092f12d28
-
SSDEEP
24576:FykI8RnQhHfKrEr1zJ9OIobDal9F6SzGYEPzbs:4kI8JQh/Su6ClCXY6s
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 4260 file2.exe 5028 file1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\KsExpert = "C:\\windows\\k.exe" file1.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\k.exe file1.exe File opened for modification C:\windows\k.exe file1.exe File created C:\WINDOWS\Menu Start\Programy\Autostart\Explore.exe file1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5028 file1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4284 wrote to memory of 4260 4284 404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe 85 PID 4284 wrote to memory of 4260 4284 404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe 85 PID 4284 wrote to memory of 4260 4284 404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe 85 PID 4284 wrote to memory of 5028 4284 404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe 86 PID 4284 wrote to memory of 5028 4284 404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe 86 PID 4284 wrote to memory of 5028 4284 404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\404f53ed2aa790c9986cbac778fc0801_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\file2.exe"C:\Users\Admin\AppData\Local\Temp\file2.exe"2⤵
- Executes dropped EXE
PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\file1.exe"C:\Users\Admin\AppData\Local\Temp\file1.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
494KB
MD5ec00db658ceb51bc8f5f57a1e8f8a5c8
SHA17a876f3e8a1d877a186710a75ec837ca04c1123f
SHA25602d2ff7c0f8853395db9d11204d1250944fdb7c0da7a4e0950a98d125e1e7fa7
SHA51231a1f5732ee5dd060ed0ff1fb0d7ecb9601e97aa2144650ba23e0408470802bff82096c44c8555b02a3c79b42eab0020204e030afba583bd8d504ca40540fca1
-
Filesize
350KB
MD5ac515aa5e3c9656c8bb3690e13078b5d
SHA14b35314617d0942f3d0113b91e3608805c333aec
SHA2562eba142b1804b6413bd99aea42578bef9bf632c34c465489e45ffe940e41840f
SHA51281c39792fea02614bb45b02ae9c8563f38d5a9a160b5537938f8ca863775c00aaa7051ceac2c9fe2837eb0578780bca948dfe8fdf62cea83d044447d580273eb