Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe
-
Size
24KB
-
MD5
fc76088256f94f4130c58028adfdc6fc
-
SHA1
153451f417e32acbc8f99d40a5065ee5babc97ab
-
SHA256
8aa47e815def1309348179b6a2608ccec58b3ded6e7868ff2673749655f2eea4
-
SHA512
b13b623c5a104fa6af0364571173ef456c8c63be5308b76c493e597327da7c4057a9f74fadbbfa092294280753bfcfc76db0305e12a49579b32d0b55bced4cee
-
SSDEEP
384:E3eVES+/xwGkRKJ0llM61qmTTMVF9/q5/0:bGS+ZfbJ0lO8qYoA8
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2156 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2772 NETSTAT.EXE 2608 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2156 tasklist.exe Token: SeDebugPrivilege 2772 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2020 fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe 2020 fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2508 2020 fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2508 2020 fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2508 2020 fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe 28 PID 2020 wrote to memory of 2508 2020 fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe 28 PID 2508 wrote to memory of 2300 2508 cmd.exe 30 PID 2508 wrote to memory of 2300 2508 cmd.exe 30 PID 2508 wrote to memory of 2300 2508 cmd.exe 30 PID 2508 wrote to memory of 2300 2508 cmd.exe 30 PID 2508 wrote to memory of 2608 2508 cmd.exe 31 PID 2508 wrote to memory of 2608 2508 cmd.exe 31 PID 2508 wrote to memory of 2608 2508 cmd.exe 31 PID 2508 wrote to memory of 2608 2508 cmd.exe 31 PID 2508 wrote to memory of 2156 2508 cmd.exe 32 PID 2508 wrote to memory of 2156 2508 cmd.exe 32 PID 2508 wrote to memory of 2156 2508 cmd.exe 32 PID 2508 wrote to memory of 2156 2508 cmd.exe 32 PID 2508 wrote to memory of 2540 2508 cmd.exe 34 PID 2508 wrote to memory of 2540 2508 cmd.exe 34 PID 2508 wrote to memory of 2540 2508 cmd.exe 34 PID 2508 wrote to memory of 2540 2508 cmd.exe 34 PID 2540 wrote to memory of 2740 2540 net.exe 35 PID 2540 wrote to memory of 2740 2540 net.exe 35 PID 2540 wrote to memory of 2740 2540 net.exe 35 PID 2540 wrote to memory of 2740 2540 net.exe 35 PID 2508 wrote to memory of 2772 2508 cmd.exe 36 PID 2508 wrote to memory of 2772 2508 cmd.exe 36 PID 2508 wrote to memory of 2772 2508 cmd.exe 36 PID 2508 wrote to memory of 2772 2508 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc76088256f94f4130c58028adfdc6fc_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2300
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2608
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2740
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5801a7e69a55c1cfda0b72cc27154506a
SHA1d11d4ebb54aa90ecb1b6e156fa7135be7ca388a7
SHA2563aecf20312371c26894b8e1f329ed23d751174c7ac545dd20195f74a9ef6933f
SHA512b5141c2313315c8523f1907c46cfbb76fb23e0bc734f0cc833e66121351fdcefe32d3ce3d88bb01c0ee98752e87aab7ee2c8cf0862b5f60f4da4f43530552379