Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe
-
Size
8.9MB
-
MD5
2074ab715fdd1eeb21ebe7af4d7a08a0
-
SHA1
868968c4653578a9b1e22a77981f2df8421975cc
-
SHA256
575175e7a4e9f822848f4d0a4486bb01cbd182716aee6dc34d450dcc1a07af09
-
SHA512
fe9f1b4aedc79cb6697b937ca23a0a55b33a5703dc200dd1eba5e7afe6f917a5fc6fec228a4fc7cdd92b398af7f8649c0c0a66c281e09d1b47b00dbab04b85a2
-
SSDEEP
196608:8Bazg7DSmBazg7DSm8Bazg7DSmBazg7DSmn:Rg7uDg7uIg7uDg7uA
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2588 7D57AD13E21.exe 2612 Scegli_nome_allegato.exe 1080 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2588 set thread context of 1080 2588 7D57AD13E21.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2412 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2612 Scegli_nome_allegato.exe 2612 Scegli_nome_allegato.exe 2612 Scegli_nome_allegato.exe 1080 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2412 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2412 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2412 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2412 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 28 PID 2912 wrote to memory of 2588 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 30 PID 2912 wrote to memory of 2588 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 30 PID 2912 wrote to memory of 2588 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 30 PID 2912 wrote to memory of 2588 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 30 PID 2912 wrote to memory of 2612 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 31 PID 2912 wrote to memory of 2612 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 31 PID 2912 wrote to memory of 2612 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 31 PID 2912 wrote to memory of 2612 2912 2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe 31 PID 2588 wrote to memory of 1080 2588 7D57AD13E21.exe 33 PID 2588 wrote to memory of 1080 2588 7D57AD13E21.exe 33 PID 2588 wrote to memory of 1080 2588 7D57AD13E21.exe 33 PID 2588 wrote to memory of 1080 2588 7D57AD13E21.exe 33 PID 2588 wrote to memory of 1080 2588 7D57AD13E21.exe 33 PID 2588 wrote to memory of 1080 2588 7D57AD13E21.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2074ab715fdd1eeb21ebe7af4d7a08a0_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2412
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad
-
Filesize
8.9MB
MD5368e298b7dba7a0e1b3958be1c4b3c37
SHA10f9b2894c580a31120ae5be5bb8b40587176b0c7
SHA256c5517fdf7534ad781e679037af2155e72d474d877185c11c865d7f38ce017256
SHA512ce09cde17fc1e5d25d22df146611a38e27dcede142c03a182704a154298d2bcc7036fce4354cc4906d9fa087f8de9769f14ad103a92485af6bdb9d5782c14eb1