Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe
-
Size
1.2MB
-
MD5
981e906ab1ad31504e51446cd676b6c9
-
SHA1
3cc10f981674e7d034bcd332a34d3fe3b85ed316
-
SHA256
c6ce5a6066399c9bcbda29754885904212e175ba039cdfb9673f52d0a6e6605d
-
SHA512
98504fcf43225ac2a22d90d74ee002da9720eed2cf50d54023b6e41d83f67ed2fc2faf9fce2b3dd69a932e6fb421003c1a7451785605d4a65f21aa8b20763fdb
-
SSDEEP
24576:8YfbaD02b292QmX32w/N5cd+AD4swhQr8e4UZQO0CmL9j7iCFZO0EcS2eyJmY1Cr:8TlymnLH4D47hkuO0r9jGCFZb9wKE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe -
Executes dropped EXE 2 IoCs
pid Process 3608 temp.exe 4240 WexTarCTx.ExE -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WexTarCTx.ExE temp.exe File opened for modification C:\Windows\SysWOW64\WexTarCTx.ExE WexTarCTx.ExE File created C:\Windows\SysWOW64\WexTarCTx.ExE temp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\uninstal.bat temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WexTarCTx.ExE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3608 temp.exe Token: SeDebugPrivilege 4240 WexTarCTx.ExE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3608 2888 JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe 86 PID 2888 wrote to memory of 3608 2888 JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe 86 PID 2888 wrote to memory of 3608 2888 JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe 86 PID 3608 wrote to memory of 4916 3608 temp.exe 88 PID 3608 wrote to memory of 4916 3608 temp.exe 88 PID 3608 wrote to memory of 4916 3608 temp.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_981e906ab1ad31504e51446cd676b6c9.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
-
C:\Windows\SysWOW64\WexTarCTx.ExEC:\Windows\SysWOW64\WexTarCTx.ExE1⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
743KB
MD542efebba0b23aebc470df8448d9841c3
SHA176f1112262dfa5ab2142832cbf1204c0bd78ae9e
SHA25683a920746478bd0113e59da8a0fcee4e0901bc24b2a1866c49212ebfb08a35cd
SHA512b72be7beff4f452d034426f3d7e34296099000aa480793baf87eb917f65cd3063bfb3b7cf3ac2f961daaa32aa980b0e740e5b7cf3328477897e21d48649b1088
-
Filesize
134B
MD5d844dfb0f997e4d32cdb6dafa4d7717a
SHA1eaa7b33e52129f946e1aca0ce3cf45a7ce36b5ec
SHA2560f38f96239893411209b61471bb7c2412a8637ce0e5cbf9cc3c23e14ee44759a
SHA512fdeeeda586bf1d748ab962bd579ab3ef69a59ab9306bd3b29663dd496bba31e0a20b62e6076c08bfef44ad821e9dd69e88a29a56d427cbba532947cf91947be5