Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe
-
Size
189KB
-
MD5
f7c5c1bdc864f26de17d3476cdad2afc
-
SHA1
b27ad10df04b9183473cc351887e30f5b5d74d6a
-
SHA256
50fc7cf932afde372c99253d7c377e9b520051641577a8ca53a0c32f4bfa16c9
-
SHA512
7f55c1b8d474786328d0545e8b6a0fbf8963cc57f986a312d9e6b7f910a758553b9fc33e545466e130300ab8c298f6e2faf1d9c0554ec5ac3da335ebf80dcb32
-
SSDEEP
3072:ocUcm0X3qDOUwUNvo8Hj/64qDuibRsksL7I:ocUK3qDpvTT6LDuib2PA
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2560 sesdessecetra.exe 2536 sesdessecetra.exe -
Loads dropped DLL 8 IoCs
pid Process 2744 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 2560 sesdessecetra.exe 2560 sesdessecetra.exe 2560 sesdessecetra.exe 2560 sesdessecetra.exe 2536 sesdessecetra.exe 2536 sesdessecetra.exe 2536 sesdessecetra.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver Control Manager v8.2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sesdessecetra.exe" f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2208 set thread context of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2560 set thread context of 2536 2560 sesdessecetra.exe 30 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 2560 sesdessecetra.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2208 wrote to memory of 2744 2208 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 28 PID 2744 wrote to memory of 2560 2744 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 29 PID 2744 wrote to memory of 2560 2744 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 29 PID 2744 wrote to memory of 2560 2744 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 29 PID 2744 wrote to memory of 2560 2744 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 29 PID 2744 wrote to memory of 2560 2744 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 29 PID 2744 wrote to memory of 2560 2744 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 29 PID 2744 wrote to memory of 2560 2744 f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe 29 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30 PID 2560 wrote to memory of 2536 2560 sesdessecetra.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7c5c1bdc864f26de17d3476cdad2afc_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"C:\Users\Admin\AppData\Local\Temp\sesdessecetra.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5f7c5c1bdc864f26de17d3476cdad2afc
SHA1b27ad10df04b9183473cc351887e30f5b5d74d6a
SHA25650fc7cf932afde372c99253d7c377e9b520051641577a8ca53a0c32f4bfa16c9
SHA5127f55c1b8d474786328d0545e8b6a0fbf8963cc57f986a312d9e6b7f910a758553b9fc33e545466e130300ab8c298f6e2faf1d9c0554ec5ac3da335ebf80dcb32