Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 11:59
Behavioral task
behavioral1
Sample
ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
ff3a02672149effa6689afaa085fa5fe
-
SHA1
c1a6e0de3e0bced093bf149d9b2f98579ea02b3a
-
SHA256
0e72a91521feec6563f3efcebb06dfaab40d334e576a1fb14397bbe7952e6721
-
SHA512
05db034a20dc3c0f30d2528f043ba57ed0d4e1530880bd30addb572a5e9906eb8d37f0a67292be0d2d4b90df0fd1d9636d6ed356e7b0b1cde2882a24e9fcfe22
-
SSDEEP
49152:xVNDUFmDI2v8ccPIWcakLHQK50ZEIrBLcakLvUcb5jacakLHQK50ZEIrBLcakLj:JDUFmDI2v8ccPIWcakLv02IrBLcakwcl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1656 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1656-0-0x0000000000400000-0x000000000065C000-memory.dmp upx behavioral1/files/0x00090000000122be-17.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 2 pastebin.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2500 schtasks.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405\Blob = 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 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\SystemCertificates\CA\Certificates\A053375BFE84E8B748782C7CEE15827A6AF5A405 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1656 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1656 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2444 1656 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 29 PID 1656 wrote to memory of 2444 1656 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 29 PID 1656 wrote to memory of 2444 1656 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 29 PID 1656 wrote to memory of 2444 1656 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 29 PID 2444 wrote to memory of 2500 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2500 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2500 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2500 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 30 PID 2444 wrote to memory of 2600 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 32 PID 2444 wrote to memory of 2600 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 32 PID 2444 wrote to memory of 2600 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 32 PID 2444 wrote to memory of 2600 2444 ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe 32 PID 2600 wrote to memory of 2072 2600 cmd.exe 34 PID 2600 wrote to memory of 2072 2600 cmd.exe 34 PID 2600 wrote to memory of 2072 2600 cmd.exe 34 PID 2600 wrote to memory of 2072 2600 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ff3a02672149effa6689afaa085fa5fe_JaffaCakes118.exe" /TN zi2YS8HC0bf2 /F3⤵
- Creates scheduled task(s)
PID:2500
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c schtasks.exe /Query /XML /TN zi2YS8HC0bf2 > C:\Users\Admin\AppData\Local\Temp\Ddbzsk4.xml3⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Query /XML /TN zi2YS8HC0bf24⤵PID:2072
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cc349a2cb17b0fe557d8f83bf1a21091
SHA18a2f839c8b4ee53e0c7b10b4f9129a2932085506
SHA2565dffb672b30b85eb45d1c53b1a6891b393d2c9b9274181fbb480ed8814a0e748
SHA512c0d7cec55fdead205136c68382328cb141f9bd3f699209e8fd20ed7dc1a3fe9c3c2bb6c5f7232d6575aa93e02673fe97904bc4c689926426c80ec5e68dae3c39
-
Filesize
3.0MB
MD5317feadc303141482b64991329b17777
SHA1ee54cd7f3e049973db43fd73c43acec30cd29210
SHA25610553ec71084cd9e9c54a90a72987c23c144011abd2893fda4afa5518b3a1a0c
SHA51225a32428f188b405c9358ea6444644b3dbb6b97b6efbc5c0cfe4cd17d08d29f71e4bf468df19278c999e9cff2c869c8b5bcd4635d8f149c55e3cfc8dbec19d74