Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe
-
Size
324KB
-
MD5
6819ce09b270a28e08a5590b948e16b4
-
SHA1
92b39821d7a830ce84869cd7bee27b21e1018f01
-
SHA256
505c40ffdc403b89f93a184d911fd460773f5d8aa6a1031df6495e36034f66ad
-
SHA512
9a087248e7e92a5ca25a369c15b658d3307e76f2c68e9605c61b7d28698c1969b8a8114b0ac7b880f856928362b05d10a77e3742f02b56218b3c8a9a7533b9f0
-
SSDEEP
6144:zdbZ0IeJxHwJfZHcDK0PDLygCexEyqRKxRVwX0Fkukez5il2+d:zjFe7wlOK0PyqEysowl
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2724 տըռբբտհ.exe 2540 տըռբբտհ.exe 1484 տըռբբտհ.exe -
Loads dropped DLL 4 IoCs
pid Process 1784 6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe 1784 6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe 2724 տըռբբտհ.exe 2724 տըռբբտհ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 1484 տըռբբտհ.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1784 wrote to memory of 2724 1784 6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2724 1784 6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2724 1784 6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe 28 PID 1784 wrote to memory of 2724 1784 6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe 28 PID 2724 wrote to memory of 2540 2724 տըռբբտհ.exe 29 PID 2724 wrote to memory of 2540 2724 տըռբբտհ.exe 29 PID 2724 wrote to memory of 2540 2724 տըռբբտհ.exe 29 PID 2724 wrote to memory of 2540 2724 տըռբբտհ.exe 29 PID 2540 wrote to memory of 2704 2540 տըռբբտհ.exe 30 PID 2540 wrote to memory of 2704 2540 տըռբբտհ.exe 30 PID 2540 wrote to memory of 2704 2540 տըռբբտհ.exe 30 PID 2540 wrote to memory of 2704 2540 տըռբբտհ.exe 30 PID 2540 wrote to memory of 2704 2540 տըռբբտհ.exe 30 PID 2540 wrote to memory of 2704 2540 տըռբբտհ.exe 30 PID 792 wrote to memory of 1484 792 taskeng.exe 34 PID 792 wrote to memory of 1484 792 taskeng.exe 34 PID 792 wrote to memory of 1484 792 taskeng.exe 34 PID 792 wrote to memory of 1484 792 taskeng.exe 34 PID 1484 wrote to memory of 1500 1484 տըռբբտհ.exe 35 PID 1484 wrote to memory of 1500 1484 տըռբբտհ.exe 35 PID 1484 wrote to memory of 1500 1484 տըռբբտհ.exe 35 PID 1484 wrote to memory of 1500 1484 տըռբբտհ.exe 35 PID 1484 wrote to memory of 1500 1484 տըռբբտհ.exe 35 PID 1484 wrote to memory of 1500 1484 տըռբբտհ.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6819ce09b270a28e08a5590b948e16b4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\ProgramData\տըռբբտհ.exe"C:\ProgramData\տըռբբտհ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\CloudApp\տըռբբտհ.exeC:\Users\Admin\AppData\Roaming\CloudApp\տըռբբտհ.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:2704
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AB72AC08-D7F1-46F3-80E1-4900D5BE309E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Roaming\CloudApp\տըռբբտհ.exeC:\Users\Admin\AppData\Roaming\CloudApp\տըռբբտհ.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD56819ce09b270a28e08a5590b948e16b4
SHA192b39821d7a830ce84869cd7bee27b21e1018f01
SHA256505c40ffdc403b89f93a184d911fd460773f5d8aa6a1031df6495e36034f66ad
SHA5129a087248e7e92a5ca25a369c15b658d3307e76f2c68e9605c61b7d28698c1969b8a8114b0ac7b880f856928362b05d10a77e3742f02b56218b3c8a9a7533b9f0