Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20240426-en
General
-
Target
83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
-
Size
789KB
-
MD5
83240a5b529691ae7f4c4d19eea3bd43
-
SHA1
d157c49756024d1fb0a3ae2f146facbda7aae45a
-
SHA256
b5f524fb3ed8f651f1ef5549af543a4a6944dd12074ad91298ea8361769656ce
-
SHA512
f03167fa1f3804862ded22884746eedde136d1694862cd0f84fd849a552486a2385264ad6f06c08020e836550a245b1d398ed015109df8c716df4d1e52ccdce7
-
SSDEEP
12288:mtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44Fv:mt8RHjEgYAw1hZlZTWQu7igcyKPEuj9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2944 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 2104 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 876 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2944 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2944 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 2944 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 2944 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2944 2104 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2944 2104 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2944 2104 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2944 2104 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2944 2104 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2944 2104 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 28 PID 2104 wrote to memory of 2944 2104 83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 28 PID 2944 wrote to memory of 676 2944 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 30 PID 2944 wrote to memory of 676 2944 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 30 PID 2944 wrote to memory of 676 2944 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 30 PID 2944 wrote to memory of 676 2944 internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe 30 PID 676 wrote to memory of 876 676 cmd.exe 32 PID 676 wrote to memory of 876 676 cmd.exe 32 PID 676 wrote to memory of 876 676 cmd.exe 32 PID 676 wrote to memory of 876 676 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\nsj7909.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\nsj7909.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsj7909.tmp/fallbackfiles/'2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\12032.bat" "C:\Users\Admin\AppData\Local\Temp\4FB1825EEDDE4B94AE27BCBB652DF58A\""3⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544B
MD57eff44d8f14103fc5d5f41fe73b4bc5d
SHA176a09654da9fc4f05d9d234b6a372ca6f52d4bdc
SHA25682645af0abaff242cf7ffbb385c405dc30c1a03d1e42ab1ba95097694c479290
SHA512ece47546999a5e77a2926d6ad1fb85b766cbee7696be3ac23c4cb9c88b3159e43b6cbf2370f3389fd09fe92f0596fab8ff1fa896e7554bd1c4d23be149205033
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\4FB1825EEDDE4B94AE27BCBB652DF58A\4FB1825EEDDE4B94AE27BCBB652DF58A_LogFile.txt
Filesize9KB
MD533deee42e2e34b5afca52f4b415f8cb3
SHA18ea0270e5daaa7a15649f938efc41a0719c5b4c1
SHA256b5aff5a9593b86e9b64321f70d93a5d648a7152ba42b0f5fac242c16eda4d8cf
SHA512cdf9296960167e017fcd6e858916e963260047543d1a261e81c910565e65b2a72f9c06d25e96dff3db96e5d971eb322fb3bebdc263bea284eeb196f70635bc96
-
Filesize
109KB
MD525109c69530dee6353d3c8e8f8cc4e39
SHA133de2d691a5d945fee411a39e15520eaacbc248f
SHA2567bb197b67633545d7a8cfcf200ff304f0fce310ccbe8f3c4c5a6587c4046b830
SHA512555d2f7730d46f51c6a34468ca32ed5a936e8803178ba054d5ea36bd87ea2571405f6341dc1f4dd318b2cf49628ea1198c570a974fcbfc20b3b48cf58a85f809
-
C:\Users\Admin\AppData\Local\Temp\nsj7909.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118_icon.ico
Filesize17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
C:\Users\Admin\AppData\Local\Temp\nsj7909.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118_splash.png
Filesize12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
\Users\Admin\AppData\Local\Temp\nsj7909.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
Filesize1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066