Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 12:45
Static task
static1
Behavioral task
behavioral1
Sample
418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe
-
Size
104KB
-
MD5
418a345985b3014859baebf1fb029ae8
-
SHA1
0eb5e89db92c78699f15d66c6adbedf52225c3c2
-
SHA256
b31f4aeb39edab45b99780aebf98451f2b9a045bb42814d2f0b3458ff2a3995d
-
SHA512
aea4ada28c2392728b18e269698e8b5e6ede1fb4a413e287cc0b17dd315a978f5e5cc9ab3402e734af207eb15ac0af4025849b5d930b1c78e54b00396a3c6f4b
-
SSDEEP
768:qY0Kk0AP0UM/ikfJ+1bmamD+OlQncbNyywqx2grUX7TUi:X1AP017B+1bP+jQqUqnrFi
Malware Config
Extracted
guloader
http://rudraagrointernational.com/cgi-bins/bin/98kksjh.bin
http://cassiagumrefined.com/css/animates/bin/98kksjh.bin
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Executes dropped EXE 1 IoCs
pid Process 2596 office365.exe -
Loads dropped DLL 4 IoCs
pid Process 2904 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 2904 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 2596 office365.exe 2524 office365.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\crome = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sub\\office365.vbs" 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\crome = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sub\\office365.vbs" office365.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1736 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 2904 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 2596 office365.exe 2524 office365.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1736 set thread context of 2904 1736 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 30 PID 2596 set thread context of 2524 2596 office365.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1736 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 2596 office365.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1736 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 2596 office365.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2904 1736 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 30 PID 1736 wrote to memory of 2904 1736 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 30 PID 1736 wrote to memory of 2904 1736 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 30 PID 1736 wrote to memory of 2904 1736 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 30 PID 1736 wrote to memory of 2904 1736 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 30 PID 2904 wrote to memory of 2596 2904 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 31 PID 2904 wrote to memory of 2596 2904 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 31 PID 2904 wrote to memory of 2596 2904 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 31 PID 2904 wrote to memory of 2596 2904 418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe 31 PID 2596 wrote to memory of 2524 2596 office365.exe 32 PID 2596 wrote to memory of 2524 2596 office365.exe 32 PID 2596 wrote to memory of 2524 2596 office365.exe 32 PID 2596 wrote to memory of 2524 2596 office365.exe 32 PID 2596 wrote to memory of 2524 2596 office365.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\418a345985b3014859baebf1fb029ae8_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\sub\office365.exe"C:\Users\Admin\AppData\Local\Temp\sub\office365.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\sub\office365.exe"C:\Users\Admin\AppData\Local\Temp\sub\office365.exe"4⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5418a345985b3014859baebf1fb029ae8
SHA10eb5e89db92c78699f15d66c6adbedf52225c3c2
SHA256b31f4aeb39edab45b99780aebf98451f2b9a045bb42814d2f0b3458ff2a3995d
SHA512aea4ada28c2392728b18e269698e8b5e6ede1fb4a413e287cc0b17dd315a978f5e5cc9ab3402e734af207eb15ac0af4025849b5d930b1c78e54b00396a3c6f4b