Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe
Resource
win7-20240215-en
General
-
Target
f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
f261e49f87f2f676581efccdd9cd1c5b
-
SHA1
6a56aacca3ec44fcbb9f4b34a89ca0b755c9f37d
-
SHA256
b5175545eb88c620b852568657049e0f94a58d4cd5bb754009e11f9f896bfc94
-
SHA512
aa1d8f2dce42cf6a2f03a3ba12d9cb1e18ff7700af43fe05d6a453ef8082e6bc4df3428cf39aa9cc70c16798a5d85dff40360a6608d877bed7ff1944b5775896
-
SSDEEP
49152:PcW4fRrLu9vsDVZiqapea6+z7YF3pT4F+UV+fZuedCVCEii3a1Z6yXPRUaP7x7B8:PX4RLu90EZpBYlpTusU0CUNyazx14
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp 2656 Qui.exe -
Loads dropped DLL 4 IoCs
pid Process 2876 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp 2656 Qui.exe -
resource yara_rule behavioral1/files/0x00060000000149e1-43.dat upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 18 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Repellendus\sunt\Qui.exe f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\is-QB8MP.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\beatae\is-2L9OT.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\et\is-QT86N.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\et\is-QQNAA.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\et\is-6SHB2.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\et\is-ERKF2.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\sunt\is-PNDMQ.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\sunt\is-JPEAF.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\is-BUK5L.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\sunt\is-DTCN0.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\sunt\is-H4L8V.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Repellendus\sunt\sqlite3.dll f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\unins000.dat f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\is-49SV1.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\beatae\is-UC5KG.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File created C:\Program Files (x86)\Repellendus\sunt\is-S5R31.tmp f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp File opened for modification C:\Program Files (x86)\Repellendus\unins000.dat f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp 2656 Qui.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2600 2876 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2600 2876 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2600 2876 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2600 2876 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2600 2876 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2600 2876 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe 28 PID 2876 wrote to memory of 2600 2876 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe 28 PID 2600 wrote to memory of 2656 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp 29 PID 2600 wrote to memory of 2656 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp 29 PID 2600 wrote to memory of 2656 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp 29 PID 2600 wrote to memory of 2656 2600 f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\is-BFF13.tmp\f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-BFF13.tmp\f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.tmp" /SL5="$400E0,3170628,721408,C:\Users\Admin\AppData\Local\Temp\f261e49f87f2f676581efccdd9cd1c5b_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Repellendus\sunt\Qui.exe"C:\Program Files (x86)\Repellendus/\sunt\Qui.exe" a0c8de61c5272da0be469b96655f3de53⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD594baa1c38d52d95ad2e6fbb1610df5d7
SHA18e8824d062f7f8eb478efb76ba653deaffc3eeb1
SHA25692eeb640e485294b8ad4c6a9aec482233ee2eedb8a70bb0e94d2a4c4b21d2e19
SHA51286fee4378677e8319e7c2506e0767122f5bc2c99ddc1ea09ed0f1df4be1301fdf8733bdd6a27f8ae56f19898030109f67f2fc23f7d8728547371728b2da4e7ae
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
2.4MB
MD53fddfbaa9d029821152e746edbabf7ce
SHA1703690b3a2377047f6755e9b5274d608791b8062
SHA256787cef456bd60075199c04ac38dd5e65291bd3a930b132538889e4dafb76fa1a
SHA512fd50e763c6523022f1be02a6a690d2a2dec4e9a73c941314b4a810bbd7605d4058c5c49c53dcbdd8fde5e6c4d2c78fcec52b5bca087cbf552bc1ce90819c4903
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63