Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
0f07eb219535a0ebfb31072fe62b22f8_JaffaCakes118.jad
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0f07eb219535a0ebfb31072fe62b22f8_JaffaCakes118.jad
Resource
win10v2004-20240419-en
General
-
Target
0f07eb219535a0ebfb31072fe62b22f8_JaffaCakes118.jad
-
Size
69KB
-
MD5
0f07eb219535a0ebfb31072fe62b22f8
-
SHA1
1410e8536187e42f5cabe69980918837dd4519ba
-
SHA256
2b38983e4ae0c1bff2e6788c22250a91fdebd9ee1bcb294d1e6f03b5cdcd5b33
-
SHA512
88069a86068213406f7ad665e20003f09362579a262efc631f34596a8d7d37546246651b81a568d9bb8074a9db57e02f38a05370623e0d6b95e6e625a80ed163
-
SSDEEP
1536:exY2pxBWG1vAxhEopvsaTScIiDzKX0Q+sej5IK:cVhYVFucb/Q+seFx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.jad rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\.jad\ = "jad_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\jad_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2688 AcroRd32.exe 2688 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2656 1952 cmd.exe 29 PID 1952 wrote to memory of 2656 1952 cmd.exe 29 PID 1952 wrote to memory of 2656 1952 cmd.exe 29 PID 2656 wrote to memory of 2688 2656 rundll32.exe 30 PID 2656 wrote to memory of 2688 2656 rundll32.exe 30 PID 2656 wrote to memory of 2688 2656 rundll32.exe 30 PID 2656 wrote to memory of 2688 2656 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\0f07eb219535a0ebfb31072fe62b22f8_JaffaCakes118.jad1⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\0f07eb219535a0ebfb31072fe62b22f8_JaffaCakes118.jad2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0f07eb219535a0ebfb31072fe62b22f8_JaffaCakes118.jad"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD520d0f30b10a3d095264e7b8bee10e213
SHA12daa9f02a82dd916a4a271b0033cbd418e2ed3ae
SHA256ea85c77f95b5f700b1cd462498bc30e4308ede2a318a5bff61540d76a28a7361
SHA51260605c6b9b9e7570346471e0500f9af0eca4b445dada609e59ab71c40c3ec8406e9441f98eae9799b2d0d4d2dcc2101ba01180bcacdc037024c115fbb79dbd3f