Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 02:20
Static task
static1
Behavioral task
behavioral1
Sample
ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe
-
Size
463KB
-
MD5
ec7895ff1c76d9878eb83a1f5f293183
-
SHA1
323cac16e31927d2dd60fcf44664a91f717ddb6b
-
SHA256
ccabffdd4bf425868896cc1db74281920b722f7ba0107c767fdbe265d8fa90da
-
SHA512
99a2bb3ad9cd27fb6ba4f11f30bca2dd7617f939f22ff82cfe93a7ed1e791a3108ec81c6eb1183f91882a2041c2b1b3e38530b96aa4a42af7d8bec4db07d71c3
-
SSDEEP
12288:jilc87eqqV5e+wBV6O+pAsRdcHzDkEca/Y:jiSqqHeVBxhsRdecEf/Y
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2196 cmdlcopy.exe 1716 ~1B7C.tmp 2136 InfDsort.exe -
Loads dropped DLL 3 IoCs
pid Process 384 ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe 384 ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe 2196 cmdlcopy.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\InfDsort = "C:\\Users\\Admin\\AppData\\Roaming\\colosort\\cmdlcopy.exe" ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\InfDsort.exe ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2196 cmdlcopy.exe 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2196 cmdlcopy.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 384 wrote to memory of 2196 384 ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe 28 PID 384 wrote to memory of 2196 384 ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe 28 PID 384 wrote to memory of 2196 384 ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe 28 PID 384 wrote to memory of 2196 384 ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1716 2196 cmdlcopy.exe 29 PID 2196 wrote to memory of 1716 2196 cmdlcopy.exe 29 PID 2196 wrote to memory of 1716 2196 cmdlcopy.exe 29 PID 2196 wrote to memory of 1716 2196 cmdlcopy.exe 29 PID 1716 wrote to memory of 1200 1716 ~1B7C.tmp 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec7895ff1c76d9878eb83a1f5f293183_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Roaming\colosort\cmdlcopy.exe"C:\Users\Admin\AppData\Roaming\colosort"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\~1B7C.tmp1200 474632 2196 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716
-
-
-
-
C:\Windows\SysWOW64\InfDsort.exeC:\Windows\SysWOW64\InfDsort.exe -s1⤵
- Executes dropped EXE
PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
463KB
MD575395c9f50f80e31ce122a1283bb3f8a
SHA14a0b2bbaa05f034247c6f58521eea0a3b16ab49c
SHA256d60369ae7c57212905e89c853dcc7c15037fe2291650956a3cf703d5c46c084e
SHA512da994b81b636fb4c1d9425e138926e7bce6ef6b53d89c6ce7558028dbf8a34222540ac3a48869c86f7e51d6aac7ab000825560cefdee56db1f2719d2450e4f64