Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe
-
Size
91KB
-
MD5
fc2a11f6b8570fc51b601515a517627f
-
SHA1
11ecc7097d9097ef2db9d7f6db3c369fff4d7f33
-
SHA256
a1ccf8f066aa22a586369c6115bec02db59477e25dbc8af362e070cd3ab0afd9
-
SHA512
2ab93991749045c7920fedc868d8c5d10d08de10cee8da7cc9aebe0db5f91c9391a2b713473e6187f7e7346fb5d33c11ede38f7633025b6076c7abf1bb8a73e8
-
SSDEEP
1536:q6yvcM7elmDwtS3C6h5Z0arJOBk/Hop+Nc+zb5:q64ckJDTBZjrJOBGo5Gb
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svchos.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\svchos.exe" svchos.exe -
Executes dropped EXE 2 IoCs
pid Process 836 svchos.exe 2652 svchos.exe -
Loads dropped DLL 2 IoCs
pid Process 1612 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 836 svchos.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\svchos.exe" svchos.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2196 set thread context of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 836 set thread context of 2652 836 svchos.exe 30 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1612 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 2652 svchos.exe 2652 svchos.exe 2652 svchos.exe 2652 svchos.exe 2652 svchos.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 2196 wrote to memory of 1612 2196 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 28 PID 1612 wrote to memory of 836 1612 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 29 PID 1612 wrote to memory of 836 1612 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 29 PID 1612 wrote to memory of 836 1612 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 29 PID 1612 wrote to memory of 836 1612 fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe 29 PID 836 wrote to memory of 2652 836 svchos.exe 30 PID 836 wrote to memory of 2652 836 svchos.exe 30 PID 836 wrote to memory of 2652 836 svchos.exe 30 PID 836 wrote to memory of 2652 836 svchos.exe 30 PID 836 wrote to memory of 2652 836 svchos.exe 30 PID 836 wrote to memory of 2652 836 svchos.exe 30 PID 836 wrote to memory of 2652 836 svchos.exe 30 PID 836 wrote to memory of 2652 836 svchos.exe 30 PID 836 wrote to memory of 2652 836 svchos.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fc2a11f6b8570fc51b601515a517627f_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Roaming\svchos.exe"C:\Users\Admin\AppData\Roaming\svchos.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\svchos.exeC:\Users\Admin\AppData\Roaming\svchos.exe4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5fc2a11f6b8570fc51b601515a517627f
SHA111ecc7097d9097ef2db9d7f6db3c369fff4d7f33
SHA256a1ccf8f066aa22a586369c6115bec02db59477e25dbc8af362e070cd3ab0afd9
SHA5122ab93991749045c7920fedc868d8c5d10d08de10cee8da7cc9aebe0db5f91c9391a2b713473e6187f7e7346fb5d33c11ede38f7633025b6076c7abf1bb8a73e8