Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/04/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe
-
Size
13KB
-
MD5
e61692f8875d714c029cbdceed785b79
-
SHA1
4676b54b2a84155d542f51ca56afe7d6d5316b25
-
SHA256
144aa7e6d9b2b100178cec70b9b335b7c1cc5d7407782955b8d643d20b458826
-
SHA512
a1df31a5f0ce7793b5625716ef1dd1101f647a0c2b35154142c4910a433c41cc019cfdfe462a90ae2f01ba58ef091e6ff845d3c12a9c8f3da4f9246eb28b00b7
-
SSDEEP
192:4TA0M7TKm1Nj4BW6Z/VpBRpUzT+xja6WTc6iWPVpvCH4kaZPMAKHeSQFP99qI9Q8:4YTKqEBDZRuz/YikAKHe7yI/7
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\pbpkjlcx.dll = "{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}" e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\pbpkjlcx.tmp e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pbpkjlcx.tmp e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pbpkjlcx.nls e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9} e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ = "C:\\Windows\\SysWow64\\pbpkjlcx.dll" e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A2C3BA54-DF75-4881-8EB3-E54B26BBBBC9}\InProcServer32\ThreadingModel = "Apartment" e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2692 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2692 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe 2692 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe 2692 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2708 2692 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe 28 PID 2692 wrote to memory of 2708 2692 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe 28 PID 2692 wrote to memory of 2708 2692 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe 28 PID 2692 wrote to memory of 2708 2692 e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e61692f8875d714c029cbdceed785b79_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\BCCA.tmp.bat2⤵
- Deletes itself
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD5ee81dfab52c2d9eb7bfd4c6aac23e2ef
SHA1dfa24453069b1ba3a47f8a9cfd5862c5a0148576
SHA256698551c013172909b924cef24f711418a0b38c562010a4df49bdd15fca8186f0
SHA51285099c4f9a2d1af4ece7c8521c403a960b5b283f90e75968341671e2676d20d54d0d8179c835b1fe5683793c7fece83cc3ea628c11654385b4656d1c668dbc91
-
Filesize
428B
MD5ba55add23ad9cfb45b2942270304cbbd
SHA18f2470c34f241351f3a4382a1966ee329ad1d3fb
SHA256b2c5d94c7f357069d9f7ba337dc574dcd9fc7c0f2e8370bf38e0f6f336822ca2
SHA51231e29581d4d603f9c88e42888b7d31004e2aeea89baf9edd9e02084f2e1a225b4b463c44e69990fae789f05b8a85117c740080c6fe1096964dd71f94e65aba27
-
Filesize
2.3MB
MD591909e334256f1758e52b0364f0f556e
SHA1e017c7fad9b20a53df9f3bdb37530960aae83a77
SHA256ecd44930de3da3ed1b399becc3d3c5f7deb1e73fa2eedf3e0540409f9fa5c34d
SHA51244e876be47d1fe618d702f74fda2a0bdcc64711df6c00301455d55f819e3f47e7da81f98a461517b0d68c9a1b58b89d798e083f1e70ac0d854019b579fcc0c12