Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe
-
Size
2.7MB
-
MD5
8e6c6cbda17663119850cefcda7764e9
-
SHA1
ad0bc72d4319b7b73a3ab26501b10004c2b0442a
-
SHA256
44c985df8656b5d3f581d9c35733919b260451469864d8225eabad086248fa97
-
SHA512
43f8116c5ab39004a8729798608293a47e3c1abe58528812f464a3b560f1a86b5e80e813e8cd3106f503d1198d76bed5d671e0d3a515ab1167ea52cd729d64ca
-
SSDEEP
24576:xDod+16p7pklMNaoy6JcPmgpBnhPfJfqTlSElnoww7E+TD2Evd33kDod+16p7pk/:WXkbAF+xM6zXkbAF+xM6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 5528 JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4856 Process not Found 3788 Process not Found 4612 Process not Found 4608 Process not Found 4688 Process not Found 4692 Process not Found 4716 Process not Found 4660 Process not Found 4628 Process not Found 4832 Process not Found 2776 Process not Found 5520 Process not Found 1028 Process not Found 5888 Process not Found 432 Process not Found 1204 Process not Found 4632 Process not Found 3404 Process not Found 5916 Process not Found 5036 Process not Found 5976 Process not Found 3584 Process not Found 3400 Process not Found 4364 Process not Found 5372 Process not Found 540 Process not Found 3828 Process not Found 4752 Process not Found 3100 Process not Found 3568 Process not Found 3620 Process not Found 2488 Process not Found 1952 Process not Found 4648 Process not Found 5204 Process not Found 6108 Process not Found 6076 Process not Found 1912 Process not Found 5184 Process not Found 532 Process not Found 1916 Process not Found 2252 Process not Found 1524 Process not Found 2492 Process not Found 1704 Process not Found 5496 Process not Found 4112 Process not Found 4988 Process not Found 3964 Process not Found 5580 Process not Found 1804 Process not Found 5656 Process not Found 5648 Process not Found 3616 Process not Found 5588 Process not Found 2244 Process not Found 5692 Process not Found 916 Process not Found 5320 Process not Found 1616 Process not Found 5592 Process not Found 2040 Process not Found 2792 Process not Found 536 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5528 JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5528 wrote to memory of 1124 5528 JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe 94 PID 5528 wrote to memory of 1124 5528 JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe 94 PID 5528 wrote to memory of 1124 5528 JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe 94 PID 5528 wrote to memory of 5824 5528 JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe 96 PID 5528 wrote to memory of 5824 5528 JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe 96 PID 5528 wrote to memory of 5824 5528 JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e6c6cbda17663119850cefcda7764e9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5528 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\oysr-9_3.cmdline"2⤵PID:1124
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9962⤵PID:5824
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3084
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:216
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:6012
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:6016
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:5172
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4432