Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2025, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe
-
Size
1.9MB
-
MD5
fa0bb9465d426ecb8f23909688d7e250
-
SHA1
950f7f96233aaa64b8281ffe9fb21ce39c035433
-
SHA256
9a1e0a844d3f8b59991f5184e59ed4ec543325a90a1104cce8b76bdb4602a5f3
-
SHA512
4de857790252e34850717b46d996eba680f879cae85a5ea2a0624411da819134961af09c83340a6342e66503b56acd53f8604e3e0b528e12d713b6f317c3bc7e
-
SSDEEP
49152:Qoa1taC070dLMKZWaxy+lBB5xduqnrsx7Pj1eN/+lF:Qoa1taC0UMKZA+lBFs8rwPjINoF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2244 7AAE.tmp -
Executes dropped EXE 1 IoCs
pid Process 2244 7AAE.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7AAE.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2244 4476 JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe 83 PID 4476 wrote to memory of 2244 4476 JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe 83 PID 4476 wrote to memory of 2244 4476 JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\7AAE.tmp"C:\Users\Admin\AppData\Local\Temp\7AAE.tmp" --splashC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_fa0bb9465d426ecb8f23909688d7e250.exe DF7F71A21F35F12CD82655BF8E2FE297D217F266760B9203AB1B708F140B45E0ACC733F568EC07C6E7A3053F95339DE998DB9910EF5A123AE8E57DDA2F2F19122⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5856187e6221292f02ebefe6e589b336e
SHA1775443230aaea439594b31a77ee41ee0d0067337
SHA2568eb36013aac69b90e9d0cec035bf104362d2fc0905d6f9ea8dc7cc71f45358f9
SHA5126094fec90dcabb3338498e3fd82cc9af5a6c908dfc1c403cacdadb0b86cc73cebd9edcbb86c45a5d879e7c74d54b7067b07c6a34cdd88b5e396e877aaaaabbb4