Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe
-
Size
514KB
-
MD5
edc0aff2c3dd34ae64562b7baec359b2
-
SHA1
b5ed8c88ac80234255622934f8f1e41b4fe94563
-
SHA256
8f45c3c0135d4723b9e5c27e9bc7bc3b9fd294918e23283a016e09a36254be02
-
SHA512
dc6927501ea3a5389a68d446154215c13c58c3e46b54802e31b86b97e88be5a6d67cda04300452f9271427991ba425dd7a5c58b28c73a7af92cdcb4c26981d5f
-
SSDEEP
12288:4EGdBIh+djo8ZMjKV4x+rWNS6y+lTri6CwiIGCJDrnHBuMXHfg+:4EGvJjrZ/Vs+rWNlr6wiIJJnhBXY+
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2070234.lnk lms.exe -
Executes dropped EXE 2 IoCs
pid Process 2864 330434.exe 2508 lms.exe -
Loads dropped DLL 10 IoCs
pid Process 2860 edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe 2864 330434.exe 2864 330434.exe 2864 330434.exe 2864 330434.exe 2508 lms.exe 2508 lms.exe 2508 lms.exe 2508 lms.exe 2508 lms.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 5 IoCs
resource yara_rule behavioral1/files/0x000e00000001224c-3.dat nsis_installer_2 behavioral1/files/0x000e000000014698-13.dat nsis_installer_1 behavioral1/files/0x000e000000014698-13.dat nsis_installer_2 behavioral1/files/0x002b000000014c67-27.dat nsis_installer_1 behavioral1/files/0x002b000000014c67-27.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2864 2860 edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2864 2860 edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2864 2860 edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2864 2860 edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2864 2860 edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2864 2860 edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe 28 PID 2860 wrote to memory of 2864 2860 edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe 28 PID 2864 wrote to memory of 2508 2864 330434.exe 29 PID 2864 wrote to memory of 2508 2864 330434.exe 29 PID 2864 wrote to memory of 2508 2864 330434.exe 29 PID 2864 wrote to memory of 2508 2864 330434.exe 29 PID 2864 wrote to memory of 2508 2864 330434.exe 29 PID 2864 wrote to memory of 2508 2864 330434.exe 29 PID 2864 wrote to memory of 2508 2864 330434.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edc0aff2c3dd34ae64562b7baec359b2_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\330434.exe"C:\Users\Admin\AppData\Local\Temp\330434.exe" /330434.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\lms.exe"C:\Users\Admin\AppData\Local\Temp\lms.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5a277e0d7f03f5950e111f0af54250d49
SHA16ae61d32a4c1a1f5150ab4861a0fbb8d7beb5a6c
SHA256a81d3331988d3e7d35f60ddc8bad5f433058405336baee4e86bbafbd9b41963c
SHA512b7d61f855d07c03d9d0cbfdf3ae37ea2d354123daa4691e23a28bf85e0929229f3bf55d6d78c26b1ee8e205c49a8babd267cb1768f335f5f6531a0f85be7c275
-
Filesize
526KB
MD5fa5736a091cc3befc086ae85e1959ea1
SHA10950a85022984ec22a059592aef31559ebfa8a36
SHA25680669099cadbb069c70af162d1ab97099621b04decefa68828345cd74af5ffcc
SHA51227c46efdf93dd71ae8af16fff659fa6ef2875f0c2d7c96390c3d32747d51e300ae1cc4307d0c5b6ab3dd1f0a3a58a91685fd8c8dfa479f9fda1796543785d535
-
Filesize
170KB
MD5cc5f8c7447aea1299da4cfebff516a50
SHA1b9b5f0bb71812fb0fb1c50ed0698e73192ad2e12
SHA256504a3f093cd81f9482a8466edf24bed71692dd7b9251c87175546c50af54f058
SHA512f8517d0e2dea5c15ef4877bcb27638bdfb20f19ccff91a80bce6d1ecdfb60987b7dcf0001364f0ce4d01160822251e3bfd12bffd2a1c93a8b5d53f9ee547b92c
-
Filesize
175KB
MD52ecb90bdf3e7ccc4e4478e3efa712588
SHA1bbdb2f00b5da20aa1340632d29126f41787d14e6
SHA256685844c38d8521f281986454a57335202b8f7f802f5499a3511f9b0d9b82046b
SHA512f20c889803299d5ecfe030c5bab1da51968e9bc3c10b366560df307ae3067a1b0b557ea66bcc014715baab33928a98c629a4aab1d5acdb15b92a33d4634d43bc