Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2025, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe
-
Size
821KB
-
MD5
b23c8de2a3a56e2fb8bacb085dbd9d19
-
SHA1
5957dbee0b2b200110787aac267be09bcecbeda2
-
SHA256
027eae741aaf031d2edcdc08920457e4c2e641c33847d67705d791f124b7781e
-
SHA512
a696b8e4cdbca841f2ecae342d8aa61c9ac9adc0849e69c715f3f3ce7b5195711bf4a22ad8c2add5bf1962d6a6cb18b751abbe73711699bce59199bd09ad2a63
-
SSDEEP
12288:kx/qRSt2dKOvWmr8VI7FitZ+TaioANCif4hdMkuvMNptn0UxqJFTP5ijOE0FPgOe:kxyvKOvLr8K7FiCTaiS1vaqqFM
Malware Config
Extracted
formbook
4.1
mo9n
circuit-town.com
stock-high.xyz
barlindelivery.com
littletoucans.com
bright-tailor.com
firsthandcares.com
ecompropeller.com
circuitoalberghiero.net
creative-egyptps.com
bitracks56.com
douhonghong.com
fingertipcollection.com
happy-bihada.space
blockchainairdropreward.com
xn--reljame-jwa.com
polloycarnesdelivery.com
d22.group
eslamshahrservice.com
vanzing.com
juzide.com
g5795ky.com
ufound1.com
cifbit.com
shawtopia.com
tourmethere.com
heritagepedia.com
832391.com
voltera.solar
greatergods.com
shchengtang.com
oyakudachibiz.com
kentislandeats.com
quietaou.com
infinitephoenix.club
tmrtg.com
menes.digital
sefappliancerepair.com
tnghana.com
tanyan.xyz
findyourtrailhead.com
labizandbryan.com
agnesdesigner.net
lebai100.com
lz-fcaini1718-hw0917-bs.xyz
nucleustudio.com
smartsparklegal.com
streets4suites.com
neo-graphite.com
maquinariaarenastlaxmexcom.com
svartmancoaching.com
icarus-groupe.com
media777.club
juicyyjuicebox.com
sakinawlake.properties
escrubpro.com
onlinecasino-tengoku.com
ganymede.sbs
sunshineprofitness.com
solideo.place
septemberstockevent100.com
tjginde.com
shopamwplanner.com
ee7r.com
sootherelaxandheal.com
lievival.info
Signatures
-
Formbook family
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/2732-13-0x0000000000400000-0x000000000042F000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4420 set thread context of 2732 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 2732 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 2732 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4420 wrote to memory of 2708 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 89 PID 4420 wrote to memory of 2708 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 89 PID 4420 wrote to memory of 2708 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 89 PID 4420 wrote to memory of 2732 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 90 PID 4420 wrote to memory of 2732 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 90 PID 4420 wrote to memory of 2732 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 90 PID 4420 wrote to memory of 2732 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 90 PID 4420 wrote to memory of 2732 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 90 PID 4420 wrote to memory of 2732 4420 JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe"{path}"2⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b23c8de2a3a56e2fb8bacb085dbd9d19.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-