Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe
-
Size
35KB
-
MD5
5529692f50962cb88722ebb42c17f13e
-
SHA1
c9b7ccc1ec9f35cb3fbb94cab4b93c78d3012e02
-
SHA256
19a3a4338de06cdd7d6ddc3a21763d45ecf2a740877de9a7b5a5bbf349f08ed3
-
SHA512
5affb65326583337d812b662c60fe3af304866920078851cf7ec32761ef87f4ed46e79e724e22f36bffa687564e55dc85f80eb02b93a5bb154f9483322c2c495
-
SSDEEP
768:8s3DGREVGLeeqbd+VujoXozT1GDl4jYJmBehJODf3jtca4:8wDG6GvWd6ujoiTJYJm0h0fz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 640 dahuahhhh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2252 3032 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe 84 PID 3032 wrote to memory of 2252 3032 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe 84 PID 3032 wrote to memory of 2252 3032 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe 84 PID 3032 wrote to memory of 740 3032 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe 86 PID 3032 wrote to memory of 740 3032 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe 86 PID 3032 wrote to memory of 740 3032 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe 86 PID 3032 wrote to memory of 640 3032 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe 87 PID 3032 wrote to memory of 640 3032 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe 87 PID 3032 wrote to memory of 640 3032 5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5529692f50962cb88722ebb42c17f13e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\´ó»°ËµÃ÷Êé.txt2⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\´ó»°.txt2⤵
- System Location Discovery: System Language Discovery
PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\dahuahhhh.exe"C:\Users\Admin\AppData\Local\Temp\dahuahhhh.exe"2⤵
- Executes dropped EXE
PID:640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD575ee11c0e8525421cea456e189c28dd7
SHA18b9f572581b3e0f4be2cd1e3e5f7e29bc9c0fe8e
SHA256059813c99a98682bf0b686cab200b00c5bd9e2ce2419ffe5bbc46576079a4208
SHA51235d41bf69d3efe041765685a3cef816a51bf3e501d2c40d3e128fe5a208d568481b8c02b638cdd0ddd1c4f880ff4e3272b207d501c926c6ad62aa5bfe71b44c6
-
Filesize
114B
MD52198e6a64d1f734e73cd88b8ea9fabb5
SHA13cc4a54f264b10771e51592595fe798b7f30189e
SHA25619c7cffb1464d60374c8bba539445d99f878072de6d1661cffab3520b5872ac3
SHA51248453926ec8f70180f84fc1e557b72bf5836148138da28a8ed5c5e370eb098e3cc81618c5124c00fe8b778f1f14da867bb118a634c898163f76a19d0acaa4056
-
Filesize
1014B
MD536961e374a894eb317203f99b372ff6a
SHA19c7a3970fbbc49095ebf808985e6086038d16e38
SHA256750204fb1b1f772d569671360fc1b2253e23cf9cc4315fedc3657593e6a765c4
SHA5126067fff56cf4d38779169cd40a48350094fbb8be74d0866a4fb54fc4328acb4bdbb43c6ec1a818f7934e719d8571eaae87c6a3b6f82fcc642aad4392e4fe44e6