Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe
-
Size
453KB
-
MD5
8c3a1db3b96205665a9a1ec894058d81
-
SHA1
9fd6b8871b0a0b45e0352670098d7211fee63208
-
SHA256
81dbbf64274c599feeef01b80d1d56d126cb607dfb54e8b65a5d7b35878b8842
-
SHA512
62b20bbee62c56bf648a9be3c2e770bf8ddeab209f73a3d3b7f6bca99b0ffcf4c4042bf002c7dcaab79a0d4bfdcae54f3c7f341f1c5e639772ca9fbd6931390e
-
SSDEEP
12288:fp7kwCTvbdS3+Slzdwn0Q/7MR9tP5huP+dCzPpG:VkwgU3+SVdwS/5h1CzPpG
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1968 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 Internet Explorer (No Add-ons).exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\WINE 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\WINE 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe File opened (read-only) \??\F: Internet Explorer (No Add-ons).exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 2036 Internet Explorer (No Add-ons).exe 2036 Internet Explorer (No Add-ons).exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2036 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2036 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2036 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 28 PID 2360 wrote to memory of 2036 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 28 PID 2036 wrote to memory of 1556 2036 Internet Explorer (No Add-ons).exe 29 PID 2036 wrote to memory of 1556 2036 Internet Explorer (No Add-ons).exe 29 PID 2036 wrote to memory of 1556 2036 Internet Explorer (No Add-ons).exe 29 PID 2036 wrote to memory of 1556 2036 Internet Explorer (No Add-ons).exe 29 PID 2036 wrote to memory of 1556 2036 Internet Explorer (No Add-ons).exe 29 PID 2036 wrote to memory of 1556 2036 Internet Explorer (No Add-ons).exe 29 PID 2036 wrote to memory of 1556 2036 Internet Explorer (No Add-ons).exe 29 PID 2036 wrote to memory of 1556 2036 Internet Explorer (No Add-ons).exe 29 PID 2036 wrote to memory of 2552 2036 Internet Explorer (No Add-ons).exe 30 PID 2036 wrote to memory of 2552 2036 Internet Explorer (No Add-ons).exe 30 PID 2036 wrote to memory of 2552 2036 Internet Explorer (No Add-ons).exe 30 PID 2036 wrote to memory of 2552 2036 Internet Explorer (No Add-ons).exe 30 PID 2036 wrote to memory of 2552 2036 Internet Explorer (No Add-ons).exe 30 PID 2036 wrote to memory of 2552 2036 Internet Explorer (No Add-ons).exe 30 PID 2036 wrote to memory of 2552 2036 Internet Explorer (No Add-ons).exe 30 PID 2036 wrote to memory of 2552 2036 Internet Explorer (No Add-ons).exe 30 PID 2360 wrote to memory of 1968 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 31 PID 2360 wrote to memory of 1968 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 31 PID 2360 wrote to memory of 1968 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 31 PID 2360 wrote to memory of 1968 2360 8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c3a1db3b96205665a9a1ec894058d81_JaffaCakes118.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\Internet Explorer (No Add-ons).exe"C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\Internet Explorer (No Add-ons).exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs3⤵PID:1556
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs3⤵PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\upd9111b243.bat"2⤵
- Deletes itself
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
277B
MD53bdce365da86399cebc653a6891cbe45
SHA1c060fc5f421eec92eca5267c6e745f518a609646
SHA2562e70fc5dc51462a9403a8d9ab3bdefd7e05818bb081140d89cdfcf64ae2f01b7
SHA512ba5fab855c1b0384b938d8d51794680b6c65a23081aed22431a8f28683f5415918beb59fe61cfe8943d9aba5b2ec64fd06cce0a29905baabce8e917ebead1486
-
\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\Internet Explorer (No Add-ons).exe
Filesize453KB
MD58c3a1db3b96205665a9a1ec894058d81
SHA19fd6b8871b0a0b45e0352670098d7211fee63208
SHA25681dbbf64274c599feeef01b80d1d56d126cb607dfb54e8b65a5d7b35878b8842
SHA51262b20bbee62c56bf648a9be3c2e770bf8ddeab209f73a3d3b7f6bca99b0ffcf4c4042bf002c7dcaab79a0d4bfdcae54f3c7f341f1c5e639772ca9fbd6931390e