Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
befadegfdg_P.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
befadegfdg_P.exe
Resource
win10v2004-20240426-en
General
-
Target
8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe
-
Size
489KB
-
MD5
8e17f2eae1da5385ce50ad181179cef8
-
SHA1
fbcadb9658b2b05c2b12682146af494a7fffefe0
-
SHA256
7e8bed4d13a1ac272b9789b44eb307430edab0bf0740d8e46c9105a459f4f429
-
SHA512
ed7d537556c552df80224c40ef512a43ef7334349b365c4fff2753d1ed9a4198f445ef70675e044b0a63ece0d57fa9ac1d26b0d8eda819f99cd0ad08ecbb9433
-
SSDEEP
12288:lOQfhJ7kNO9EoUOPKD3ypHaWIjsDEDsj:lHJ7kY9EoUpDipjED
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2140 befadegfdg_P.exe -
Loads dropped DLL 2 IoCs
pid Process 2368 8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe 2368 8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2608 wmic.exe Token: SeSecurityPrivilege 2608 wmic.exe Token: SeTakeOwnershipPrivilege 2608 wmic.exe Token: SeLoadDriverPrivilege 2608 wmic.exe Token: SeSystemProfilePrivilege 2608 wmic.exe Token: SeSystemtimePrivilege 2608 wmic.exe Token: SeProfSingleProcessPrivilege 2608 wmic.exe Token: SeIncBasePriorityPrivilege 2608 wmic.exe Token: SeCreatePagefilePrivilege 2608 wmic.exe Token: SeBackupPrivilege 2608 wmic.exe Token: SeRestorePrivilege 2608 wmic.exe Token: SeShutdownPrivilege 2608 wmic.exe Token: SeDebugPrivilege 2608 wmic.exe Token: SeSystemEnvironmentPrivilege 2608 wmic.exe Token: SeRemoteShutdownPrivilege 2608 wmic.exe Token: SeUndockPrivilege 2608 wmic.exe Token: SeManageVolumePrivilege 2608 wmic.exe Token: 33 2608 wmic.exe Token: 34 2608 wmic.exe Token: 35 2608 wmic.exe Token: SeIncreaseQuotaPrivilege 2608 wmic.exe Token: SeSecurityPrivilege 2608 wmic.exe Token: SeTakeOwnershipPrivilege 2608 wmic.exe Token: SeLoadDriverPrivilege 2608 wmic.exe Token: SeSystemProfilePrivilege 2608 wmic.exe Token: SeSystemtimePrivilege 2608 wmic.exe Token: SeProfSingleProcessPrivilege 2608 wmic.exe Token: SeIncBasePriorityPrivilege 2608 wmic.exe Token: SeCreatePagefilePrivilege 2608 wmic.exe Token: SeBackupPrivilege 2608 wmic.exe Token: SeRestorePrivilege 2608 wmic.exe Token: SeShutdownPrivilege 2608 wmic.exe Token: SeDebugPrivilege 2608 wmic.exe Token: SeSystemEnvironmentPrivilege 2608 wmic.exe Token: SeRemoteShutdownPrivilege 2608 wmic.exe Token: SeUndockPrivilege 2608 wmic.exe Token: SeManageVolumePrivilege 2608 wmic.exe Token: 33 2608 wmic.exe Token: 34 2608 wmic.exe Token: 35 2608 wmic.exe Token: SeIncreaseQuotaPrivilege 2584 wmic.exe Token: SeSecurityPrivilege 2584 wmic.exe Token: SeTakeOwnershipPrivilege 2584 wmic.exe Token: SeLoadDriverPrivilege 2584 wmic.exe Token: SeSystemProfilePrivilege 2584 wmic.exe Token: SeSystemtimePrivilege 2584 wmic.exe Token: SeProfSingleProcessPrivilege 2584 wmic.exe Token: SeIncBasePriorityPrivilege 2584 wmic.exe Token: SeCreatePagefilePrivilege 2584 wmic.exe Token: SeBackupPrivilege 2584 wmic.exe Token: SeRestorePrivilege 2584 wmic.exe Token: SeShutdownPrivilege 2584 wmic.exe Token: SeDebugPrivilege 2584 wmic.exe Token: SeSystemEnvironmentPrivilege 2584 wmic.exe Token: SeRemoteShutdownPrivilege 2584 wmic.exe Token: SeUndockPrivilege 2584 wmic.exe Token: SeManageVolumePrivilege 2584 wmic.exe Token: 33 2584 wmic.exe Token: 34 2584 wmic.exe Token: 35 2584 wmic.exe Token: SeIncreaseQuotaPrivilege 2880 wmic.exe Token: SeSecurityPrivilege 2880 wmic.exe Token: SeTakeOwnershipPrivilege 2880 wmic.exe Token: SeLoadDriverPrivilege 2880 wmic.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2140 2368 8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe 28 PID 2368 wrote to memory of 2140 2368 8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe 28 PID 2368 wrote to memory of 2140 2368 8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe 28 PID 2368 wrote to memory of 2140 2368 8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe 28 PID 2140 wrote to memory of 2608 2140 befadegfdg_P.exe 29 PID 2140 wrote to memory of 2608 2140 befadegfdg_P.exe 29 PID 2140 wrote to memory of 2608 2140 befadegfdg_P.exe 29 PID 2140 wrote to memory of 2608 2140 befadegfdg_P.exe 29 PID 2140 wrote to memory of 2584 2140 befadegfdg_P.exe 32 PID 2140 wrote to memory of 2584 2140 befadegfdg_P.exe 32 PID 2140 wrote to memory of 2584 2140 befadegfdg_P.exe 32 PID 2140 wrote to memory of 2584 2140 befadegfdg_P.exe 32 PID 2140 wrote to memory of 2880 2140 befadegfdg_P.exe 34 PID 2140 wrote to memory of 2880 2140 befadegfdg_P.exe 34 PID 2140 wrote to memory of 2880 2140 befadegfdg_P.exe 34 PID 2140 wrote to memory of 2880 2140 befadegfdg_P.exe 34 PID 2140 wrote to memory of 2636 2140 befadegfdg_P.exe 36 PID 2140 wrote to memory of 2636 2140 befadegfdg_P.exe 36 PID 2140 wrote to memory of 2636 2140 befadegfdg_P.exe 36 PID 2140 wrote to memory of 2636 2140 befadegfdg_P.exe 36 PID 2140 wrote to memory of 2484 2140 befadegfdg_P.exe 38 PID 2140 wrote to memory of 2484 2140 befadegfdg_P.exe 38 PID 2140 wrote to memory of 2484 2140 befadegfdg_P.exe 38 PID 2140 wrote to memory of 2484 2140 befadegfdg_P.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8e17f2eae1da5385ce50ad181179cef8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\befadegfdg_P.exeC:\Users\Admin\AppData\Local\Temp\befadegfdg_P.exe 0\5\0\8\6\9\2\0\3\6\1 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2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717331752.txt bios get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717331752.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717331752.txt bios get version3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717331752.txt bios get version3⤵PID:2636
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81717331752.txt bios get version3⤵PID:2484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD59025468f85256136f923096b01375964
SHA17fcd174999661594fa5f88890ffb195e9858cc52
SHA256d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df
SHA51292cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51
-
Filesize
674KB
MD593c3c1d0d5299bb9cefe9e9181a17070
SHA177a89de10714fd3862276d65ca4cb440628d81a4
SHA256fbe70131b58335fc221283fe76ee5ebeef38c677ab97a7a775ec1a8beb32aaa7
SHA5129e2871266f95a6f96fd92db2f37141f4a39b095922e1a6f482a73fbaaeb653464f4ff0e445ef3aec95e9b1f2437245ff68fd7bc1c5e5341c572b24a1e4ab0ce3