Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe
-
Size
1.0MB
-
MD5
efdae08118be99a41dddcfb0918d3f42
-
SHA1
ce3d1472b1f754e5ec0123ecb4d87ccc03e3121b
-
SHA256
9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d
-
SHA512
840c4c1e0f57d00bbb788e2529d95f12b526c6bc75a1a73a50b65a6442306465299c009a50dffae127f70d5178bc4c24866a63f495fd91cd7c3b56c77516b603
-
SSDEEP
12288:LAGApB+LGjzOQWOxxnDC7nVD4BIaFFEnd0XZ3lvMgTADqjJ5n+pUJj3seT0Ciw2j:LArpBSCWXrV0od0/Vrjr+gK
Malware Config
Extracted
formbook
pcbd
zmUiPvT3GhgT0MCJ0cfkdEhzgw==
yysIUP08pEEFmg==
OJocz3OwWxa3dlw=
x2zXJcwJW4ov1HTk6fxkGhA=
sBLZbXS1UNRrKtXRVg==
J7Gg45CjxQ2yXGVNjhW+dGl6PjA=
oSLxdZGii2ZZLxbgL/pUqQ==
2G7zNzNizyjjeRKY3gb29GOeiJsHWraj
X+hZnXgqSha3dlw=
8QPQWQkxuy0j2HtGXkIm
T6BRyfomMTvOiYQU
ovrVJa7GS9a4cnAsW6YEGrI6
4oqCON+BsDIPjQ==
4HZHw9TpIMrFkA==
LELMEKLXyAL4mA==
yuKpL7C5UQB4bHFYnOMu
ZYcWydXqPiqQq1wIGdA=
Y3EsQV5+IYd3NuyDi/2avRg=
4LRr6nWZPJunXDsCKmrNb2UIogogQg==
AA4kD8BCSxa3dlw=
wMdAhREu11RRRem1SQ==
oCa06gs43lcAj4hytmaVu6E2
RJwtSd7zbcSTI0EnZxNqPAnxF7h/Sg==
53QaqL/xHAjJnRjHUA==
16hT3XbCqACNflwIfhRvx1sgCjI=
uCY0e6TN9xa3dlw=
ZvbBQ2Om0dLbjUI2aTQx
VV5IA5OoPaJV8sSFmVt43bM0
DmjzPWJ9JJuOKRrYVuQ/h/yX8WZZOZTrsg==
dlLRGqH1Yd6/Rx7nL/pUqQ==
+3n9NUZQ71Ef1IRGXkIm
9Vv1Q1pjSiPYdBuR75D3irQuiw==
oDAiOxdD43MzzYdGXkIm
qgOeMEE5VFsyycZipvyVz7Q8
/lQLh6O4Gse9cVQ=
Qd08vVN/Io+IMybkL/pUqQ==
ttZitEBO82wv1n9GXkIm
PRuq5IGoxdRZLQy4S+o+29Vuz2dUOZTrsg==
iqo/dhY5pvTJnRjHUA==
6D6w+RRBY0Ic1MZrcCF+oTsYHzg=
a4NqIdVEqyP1
F6APXXW3MYUC4n4D
l17/dgot1VJHChHPUwBa/OefpYy4
z1jdL/5NOg==
tgrxM+QjowfFUuNrtwCVz7Q8
8FTzdZm5omc82NubEho9a0HBI82w
MzQGhxsht0EOw4RGXkIm
+lTWCztM52RBA8i4+OOsCRA=
rDUFiai319K5iQSz+zQg
aLqO0W+4B/TchkI2aTQx
ytqjMcv3MsGib14=
m3ksrV138UXOiYQU
u8uYHNBEqyP1
A24ES2R3F41qGfzIT0EovbBg+i4lSA==
aXT3K9zx3dKmMP6uKbT/irQuiw==
A+hbrkNU+HuDOCwazGOw9XQIogogQg==
E5hI4vgkjDUk65oGWA==
CRij6IntxaifnRjHUA==
wR7KUWmiHYEC4n4D
L71mfxxJpEEFmg==
LQmuL8Xvof3PdkjHAdgxO5iwhpgHWraj
MTwujZHQ69nGjIRzyRt23PIVJMiBSg==
nrBx6EyxJXIC4n4D
XjgHgyVQ8a5B23cB
mihoyobbs.com
Signatures
-
Formbook family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1212 set thread context of 4032 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 4032 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 4032 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1212 wrote to memory of 4576 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 89 PID 1212 wrote to memory of 4576 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 89 PID 1212 wrote to memory of 4576 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 89 PID 1212 wrote to memory of 4040 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 91 PID 1212 wrote to memory of 4040 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 91 PID 1212 wrote to memory of 4040 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 91 PID 1212 wrote to memory of 4428 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 92 PID 1212 wrote to memory of 4428 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 92 PID 1212 wrote to memory of 4428 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 92 PID 1212 wrote to memory of 4032 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 93 PID 1212 wrote to memory of 4032 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 93 PID 1212 wrote to memory of 4032 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 93 PID 1212 wrote to memory of 4032 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 93 PID 1212 wrote to memory of 4032 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 93 PID 1212 wrote to memory of 4032 1212 JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PyxGxWvHkeU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2FB6.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe"{path}"2⤵PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe"{path}"2⤵PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c308cf0c5193b3764e892d8cc3f93b9ce20762f918a74cc4f7b07544ab5bd4d.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57e2270f9347e76896fdf8f7d6803ea14
SHA179644a2a4f5fccb5a871871e038245324c5ae1af
SHA256b9111f9b29e6d1998c4feec25809318c6131fdd24c1e72cd901f670a96762d0b
SHA51266acc3aa5245163254f922c431d1c762da2e9c0312f2c218f5d16fbd5c3171891924f7fb2c3cadebc496b2166fb7b5fc1a940e38313cbe990197e9bb773b6d67