Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe
-
Size
582KB
-
MD5
f6b7effebe4708544640c9a033a4688b
-
SHA1
79ae5c325c90f065ba0ad9ef43e03709bdc2aecd
-
SHA256
7b945b5dfbfc10571d7ace8c450c5839b2539bcc753a8525333c2d21eed74990
-
SHA512
12f3a3ed5fb04eee6343a00d22ea35517dfe8217d3cc080db8bed4ea4b8dc57069a11a9014ec41316ae0b0e7ac70e14c157cde4f80b4ea0e0b12b22196783399
-
SSDEEP
12288:xN6pzhWifNaC3tMIYVNb3y7VjfUJhtZ6iq:OzhWifNaCmDy7t0htcL
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\ofwtyp.sys f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe -
Sets DLL path for service in the registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ofwtyp\Parameters\ServiceDll = "%SystemRoot%\\System32\\ofwtyp.dll" f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\ofwtyp\Parameters\ServiceDll = "%SystemRoot%\\System32\\ofwtyp.dll" f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\ofwtyp\Parameters\ServiceDll = "%SystemRoot%\\System32\\ofwtyp.dll" f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ofwtyp\Parameters\ServiceDll = "%SystemRoot%\\System32\\ofwtyp.dll" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\ofwtyp\Parameters\ServiceDll = "%SystemRoot%\\System32\\ofwtyp.dll" svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\ofwtyp\Parameters\ServiceDll = "%SystemRoot%\\System32\\ofwtyp.dll" svchost.exe -
Deletes itself 1 IoCs
pid Process 1640 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1708 f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe 1640 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ofwtyp.dll f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f6b7effebe4708544640c9a033a4688b_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:1708
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k ofwtyp1⤵
- Sets DLL path for service in the registry
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD57a9e48a6d299f4e55570f3be3db2c6e1
SHA100f0ae8f2b61920464a7f021e7f4a57c4c48d0d4
SHA256671bf8768ca5cf9e2bcd8e585ff0243de2d4b3e75630233b183d4cf998fc704e
SHA512c7762264a78c298b60c82bd9e5f8e5d032745a1cb72c984ce9cd98579198f7118308f907d92890893da0edac0614d2ff396fcf76ff7b4d7cd7930fc64eb9a05c