Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2025, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe
-
Size
513KB
-
MD5
7ba1d18562d7219931228d66d4d5e4d1
-
SHA1
b4bd541564dc53bb38dd884c4853cdf035bc5dd5
-
SHA256
08e8b75fb98b28e50863662508ed74de229fbc052923f8db05822861ae081d51
-
SHA512
b433fbebf9b81ad42f86a1597b03eb427ac2c93b40aab73bf3eaf9df5786815782009d91d30b2234438f57b5c4cc1d7f94201e3e3d9b34b8339792a3bca697d2
-
SSDEEP
12288:WcgFDJ6B42I08WbtJc7vmg41KU3ZE0D1msMf+su:p8AB42I0ntJc7vmg41bRHMf+s
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3484 JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe 3484 JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3484 set thread context of 3724 3484 JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 956 3724 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3484 wrote to memory of 3724 3484 JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe 86 PID 3484 wrote to memory of 3724 3484 JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe 86 PID 3484 wrote to memory of 3724 3484 JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe 86 PID 3484 wrote to memory of 3724 3484 JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7ba1d18562d7219931228d66d4d5e4d1.exe2⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 803⤵
- Program crash
PID:956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3724 -ip 37241⤵PID:3444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5d848ca40948f7c464f239d96bc7c9632
SHA1851634e1bdd7a1d286d96a3c938b4114d26dbc69
SHA25661bedf0d2927f44da317aab4dcb0d6c9010ee6d4a8c678ece6bf90639aa74523
SHA51266fc4da86e5b5dd693ea93fa13e44a50f15ffe14e677b39fe6cb2719a941a2cbd36bc227e63a9125a0167c99b924e82e10edad696fe8b8434811aeca93ffa763