Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2025, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_768e8368334a1bfbda3c64117a5165e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_768e8368334a1bfbda3c64117a5165e0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_768e8368334a1bfbda3c64117a5165e0.exe
-
Size
392KB
-
MD5
768e8368334a1bfbda3c64117a5165e0
-
SHA1
29cdad7a0ac907fe30b116a3141c1142dae39f2d
-
SHA256
471321e524c0e8e953a93252bece320d7b1149265f5ac28ee8cce086c7040c4f
-
SHA512
2d813fde649bcd9370d462f865194cd6d456e71fa11daf61ae8fa30503f7384504bac90816b1747a0beb2a013b707f8e9efc12b71a9844801bf2972edaa6ae86
-
SSDEEP
6144:R6L5F/wmqZT81G8p9KMYnf4aQUcV4VpBbF28CoghzRWGmb4hoNYKTHp8Ck:R6HwzZTN8DKMNk9Z28E04aNYSHp8Ck
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 4316 dw20.exe Token: SeBackupPrivilege 4316 dw20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3884 wrote to memory of 4316 3884 JaffaCakes118_768e8368334a1bfbda3c64117a5165e0.exe 83 PID 3884 wrote to memory of 4316 3884 JaffaCakes118_768e8368334a1bfbda3c64117a5165e0.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_768e8368334a1bfbda3c64117a5165e0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_768e8368334a1bfbda3c64117a5165e0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 7882⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4316
-