Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/04/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe
-
Size
15.9MB
-
MD5
c08b8818e0f884170d03efe476315c6d
-
SHA1
d7d980427342d00cab78b6c56b0fb20d1d359d0a
-
SHA256
72a5c13ea2529238f39e86a718473d7d89ebbf78b781fbf2ac55ce9ded09cd0d
-
SHA512
6fad815f044c39b23376ae9646d8ef89ffb9ccc6e1e8d4c882ab493e3bd60d2461e588ff84d7cbb017ff9bc426c137557add37b5f0614498cd5882b37b3d73d1
-
SSDEEP
393216:Tg7upg7upg7upg7upg7upg7upg7upg7uN:USqSqSqSqSqSqSqSN
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2568 7D57AD13E21.exe 2716 Scegli_nome_allegato.exe 1848 7D57AD13E21.exe -
Loads dropped DLL 3 IoCs
pid Process 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 1848 2568 7D57AD13E21.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2160 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2716 Scegli_nome_allegato.exe 2716 Scegli_nome_allegato.exe 2716 Scegli_nome_allegato.exe 1848 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2160 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 28 PID 2888 wrote to memory of 2160 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 28 PID 2888 wrote to memory of 2160 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 28 PID 2888 wrote to memory of 2160 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 28 PID 2888 wrote to memory of 2568 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2568 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2568 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2568 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 30 PID 2888 wrote to memory of 2716 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 31 PID 2888 wrote to memory of 2716 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 31 PID 2888 wrote to memory of 2716 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 31 PID 2888 wrote to memory of 2716 2888 c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe 31 PID 2568 wrote to memory of 1848 2568 7D57AD13E21.exe 33 PID 2568 wrote to memory of 1848 2568 7D57AD13E21.exe 33 PID 2568 wrote to memory of 1848 2568 7D57AD13E21.exe 33 PID 2568 wrote to memory of 1848 2568 7D57AD13E21.exe 33 PID 2568 wrote to memory of 1848 2568 7D57AD13E21.exe 33 PID 2568 wrote to memory of 1848 2568 7D57AD13E21.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c08b8818e0f884170d03efe476315c6d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2160
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1848
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15.9MB
MD511f8bace4e1cd0fb78116702a9f7fe83
SHA1577d2232f859564b51af90bc70ab95a369cc62d1
SHA25654afd74bf419a23f72aa56883eea619ca90c622bfbac73ea689d445ce5babca4
SHA51228a76055009fca9f3f6f05e5262c70b3fa68c1e092c1c1465254d52362c36b6e19d241f82660b87870b6352ff0560db61eaf4d0b549d102d4e9027e07fe2da3a
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad