Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 21:14
Static task
static1
Behavioral task
behavioral1
Sample
53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe
-
Size
14KB
-
MD5
53c458b4ed395f5b0d39bdc8834915b6
-
SHA1
cbe66c2b4c92ca1cc80a74199d6d8da8fe481d40
-
SHA256
5ebfae04ff09cc0126a86bce3c42e01bce6aca4dd87a63c9663a347e52ade99d
-
SHA512
3aa09a1faeab3854ccc09c3cbebfdc70e1b9c613ccc8984ab0e2b462305af5e7c02c411b9da181b22717ba93286419510cc30ed8b8d07a96ab7087d83d5b2c46
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhRa:hDXWipuE+K3/SSHgxO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation DEMB9F.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation DEMB20A.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation DEM913.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation DEM5F51.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation DEMB59F.exe -
Executes dropped EXE 6 IoCs
pid Process 1272 DEMB20A.exe 2196 DEM913.exe 4828 DEM5F51.exe 4272 DEMB59F.exe 1424 DEMB9F.exe 3448 DEM61CD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB20A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM913.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM5F51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB59F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEMB9F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DEM61CD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1272 4380 53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe 100 PID 4380 wrote to memory of 1272 4380 53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe 100 PID 4380 wrote to memory of 1272 4380 53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe 100 PID 1272 wrote to memory of 2196 1272 DEMB20A.exe 107 PID 1272 wrote to memory of 2196 1272 DEMB20A.exe 107 PID 1272 wrote to memory of 2196 1272 DEMB20A.exe 107 PID 2196 wrote to memory of 4828 2196 DEM913.exe 110 PID 2196 wrote to memory of 4828 2196 DEM913.exe 110 PID 2196 wrote to memory of 4828 2196 DEM913.exe 110 PID 4828 wrote to memory of 4272 4828 DEM5F51.exe 112 PID 4828 wrote to memory of 4272 4828 DEM5F51.exe 112 PID 4828 wrote to memory of 4272 4828 DEM5F51.exe 112 PID 4272 wrote to memory of 1424 4272 DEMB59F.exe 122 PID 4272 wrote to memory of 1424 4272 DEMB59F.exe 122 PID 4272 wrote to memory of 1424 4272 DEMB59F.exe 122 PID 1424 wrote to memory of 3448 1424 DEMB9F.exe 124 PID 1424 wrote to memory of 3448 1424 DEMB9F.exe 124 PID 1424 wrote to memory of 3448 1424 DEMB9F.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\53c458b4ed395f5b0d39bdc8834915b6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\DEMB20A.exe"C:\Users\Admin\AppData\Local\Temp\DEMB20A.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\DEM913.exe"C:\Users\Admin\AppData\Local\Temp\DEM913.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\DEM5F51.exe"C:\Users\Admin\AppData\Local\Temp\DEM5F51.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\DEMB59F.exe"C:\Users\Admin\AppData\Local\Temp\DEMB59F.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\DEMB9F.exe"C:\Users\Admin\AppData\Local\Temp\DEMB9F.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\DEM61CD.exe"C:\Users\Admin\AppData\Local\Temp\DEM61CD.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3448
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5bf0aaf6dbba9c27f64fd4c00b3f79b78
SHA12d461053799fe259a1768ba3191db7392fd26f6a
SHA25632efec9bb5799c674a6b94eaf49a0fe23e6e333fb3ee1bdb804c6b8c7b2fd0eb
SHA512548e42c7d5c5c2875b09ee793b8be08eec7c9bbe1bc45da961fb948a458e774703abf4945c47f02b1c388f259151a550574669ea860f2342561af2f7145afc55
-
Filesize
14KB
MD5e16a3598c8b8b0f2165597dec65b7446
SHA1928e81bf9e14493624b31edc6e1af284c5721218
SHA2569d55afded80ff673617860c6f92c92964d3719d3c0f93b51224edf2ee62ad930
SHA512fc5bf9c64fc59f08802185c362a97cf744f2579d6795305bec536d0a9a89be7c227c54cc7745380e7346b86693d0d10280defa88f801465f83362fbc7303f276
-
Filesize
14KB
MD5b450ff72307312286150f35977c393c8
SHA1f6475a9db886029d312b1f52befeba32747e3425
SHA256aaede8b38c7f5e421cceebd9888f68249d8d34fba8aff9ed926052f3b022f9d8
SHA512af7cb02aa7e705c254fa8dc64d7ce705a29a9e28e9224aeb2eb5688e797ea923831a61e7fd4b6d18daf37642c18dadd8b61e6d37835b62c7e702912075798813
-
Filesize
14KB
MD5bdffa61102a96cdbf3198defd31763d2
SHA15a65fdfbab546ced24f8dc50955acc1fcdbc8d78
SHA256402378a2772bc7b404a479d30ef6f5d7d6b387306e6e74f154da8f5bf426a536
SHA51232aa7bb3250a612e80ca7d3d3826fcf4e0e0a0be007157862f81981500d8954c800bafadeee18cae7cd0376f43f82812f5e43891200f25bc2d65248dd89587c8
-
Filesize
14KB
MD595332e75d08949adc3b5d864011dc7df
SHA1dcc63f8a07c3a267bc43b9e0621106df35d692f0
SHA2568cd201b117f5b7ede4d1343a7ad76f9d93febae3ab6adf3f1503dc57d2e65315
SHA512260704ffb0c1191505e7d31f1341352d81f88d71fda0e6c01ef8b41c44e3b3a6e9d07dcedd3ddaa0e1e636d8feb44b001998496202933be60df9e788b0c5ae0f
-
Filesize
14KB
MD519d5ead36cbcc6e0c7272d6e98808ab1
SHA1b5820879cb534b798b53a196fcb214871169bff7
SHA2562cdf66de011db3bec1a971cc718b924958199274ce46364a34bd647c08d6d073
SHA51243161fcbcc5857400f3838fdbf2eecfe8c99f3fe5d1c76077a230c09881431daf988f3d6d9430f829052b958ca24d5ea17bfd14c83c342bb9cd1af2905ce9624