Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe
-
Size
355KB
-
MD5
fc641b258ae6e7733a0a94e106378393
-
SHA1
14df80f3376d385b610175fb913071e3e98adef5
-
SHA256
8c88aabb830a0b7b12c885a0e22df7f46b6c71e6024166fef19c7fa9b8c1ad0d
-
SHA512
fad0663001391daa98be3fc97a0e361e897e5506e50729e66128f98a646b545d9b320775091bc3b2cf743a4e90262a93fb44ad52db502bc3793c1d794001403a
-
SSDEEP
6144:cXYD0vpUDajn3uYAQsvRzDzuaraPqCmtgB/IZLjJoxGq6IEoF:cXYD0BUej3giqaiLtgBYFYGq66F
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1604 server.exe -
Loads dropped DLL 1 IoCs
pid Process 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1604 server.exe 1604 server.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: 33 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe Token: 33 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe Token: 33 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe Token: 33 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe Token: 33 1604 server.exe Token: SeIncBasePriorityPrivilege 1604 server.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1604 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe 28 PID 1976 wrote to memory of 1604 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe 28 PID 1976 wrote to memory of 1604 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe 28 PID 1976 wrote to memory of 1604 1976 fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe 28 PID 1604 wrote to memory of 1200 1604 server.exe 21 PID 1604 wrote to memory of 1200 1604 server.exe 21 PID 1604 wrote to memory of 1200 1604 server.exe 21 PID 1604 wrote to memory of 1200 1604 server.exe 21 PID 1604 wrote to memory of 1200 1604 server.exe 21 PID 1604 wrote to memory of 1200 1604 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc641b258ae6e7733a0a94e106378393_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1432.08.05T22.38\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\1432.08.05T22.38\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe
Filesize17KB
MD54927ddbb60db41b4b6fe90540c5ae7bb
SHA13626a815c0c8039361baf12a6d4fc3a1d06676df
SHA256f17dcb91e79f9d879a66ad7ff536da5261f6d57af58fb455e903c2920d6fc018
SHA5125bf3cc72eb8cbe92f90ecc761ac59e14a30baa60f79343d3ce576155d6e490be09c92fe13c3567b813997a2c1e2354f3c0abbc500217590e0a422ca8b4fdb32c