Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe
-
Size
712KB
-
MD5
9ff7edfe77efb892b78b9afe94d7589a
-
SHA1
cb61f8e1dfb7a4720c87c85b8bdb33a9deab5b9c
-
SHA256
efc0d9b8a1248079246a0c700927c2405ef76b5e6a899c8e97f603d54651db40
-
SHA512
0b978fafc19e2ecebd16323a8a1ef69e25afa8246568e72e83f70538a01391c032a75ea0c2eeafb2152947cfe9b1faab89799505604cfbb7977d89257b5729d7
-
SSDEEP
12288:W6qx+GgJOpEheBWpJ0NjYZZRKFdCFqPryQ32E9i/4B:8QlmWpJGYZZ4FsFEpn
Malware Config
Extracted
amadey
1.99
217.8.117.41/nbDcw2d/index.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 bdif.exe -
Loads dropped DLL 2 IoCs
pid Process 1648 9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe 1648 9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2012 schtasks.exe 1900 schtasks.exe -
NTFS ADS 1 IoCs
description ioc Process File created \??\c:\programdata\44def37582\bdif.exe:Zone.Identifier 9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1648 9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe 2692 bdif.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2692 1648 9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe 28 PID 1648 wrote to memory of 2692 1648 9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe 28 PID 1648 wrote to memory of 2692 1648 9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe 28 PID 1648 wrote to memory of 2692 1648 9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe 28 PID 2692 wrote to memory of 1248 2692 bdif.exe 32 PID 2692 wrote to memory of 1248 2692 bdif.exe 32 PID 2692 wrote to memory of 1248 2692 bdif.exe 32 PID 2692 wrote to memory of 1248 2692 bdif.exe 32 PID 2692 wrote to memory of 1244 2692 bdif.exe 31 PID 2692 wrote to memory of 1244 2692 bdif.exe 31 PID 2692 wrote to memory of 1244 2692 bdif.exe 31 PID 2692 wrote to memory of 1244 2692 bdif.exe 31 PID 2692 wrote to memory of 1272 2692 bdif.exe 33 PID 2692 wrote to memory of 1272 2692 bdif.exe 33 PID 2692 wrote to memory of 1272 2692 bdif.exe 33 PID 2692 wrote to memory of 1272 2692 bdif.exe 33 PID 2692 wrote to memory of 1420 2692 bdif.exe 35 PID 2692 wrote to memory of 1420 2692 bdif.exe 35 PID 2692 wrote to memory of 1420 2692 bdif.exe 35 PID 2692 wrote to memory of 1420 2692 bdif.exe 35 PID 1244 wrote to memory of 2012 1244 cmd.exe 39 PID 1244 wrote to memory of 2012 1244 cmd.exe 39 PID 1244 wrote to memory of 2012 1244 cmd.exe 39 PID 1244 wrote to memory of 2012 1244 cmd.exe 39 PID 1248 wrote to memory of 1900 1248 cmd.exe 40 PID 1248 wrote to memory of 1900 1248 cmd.exe 40 PID 1248 wrote to memory of 1900 1248 cmd.exe 40 PID 1248 wrote to memory of 1900 1248 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9ff7edfe77efb892b78b9afe94d7589a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\programdata\44def37582\bdif.exec:\programdata\44def37582\bdif.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd.exe /C SCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe4⤵
- Creates scheduled task(s)
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C SCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC HOURLY /MO 1 /TN 83bb50ad72ec066ba3b2332b06c6d86c /TR c:\programdata\44def37582\bdif.exe4⤵
- Creates scheduled task(s)
PID:1900
-
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d c:\programdata\44def375823⤵PID:1272
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d c:\programdata\44def375823⤵PID:1420
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD59ff7edfe77efb892b78b9afe94d7589a
SHA1cb61f8e1dfb7a4720c87c85b8bdb33a9deab5b9c
SHA256efc0d9b8a1248079246a0c700927c2405ef76b5e6a899c8e97f603d54651db40
SHA5120b978fafc19e2ecebd16323a8a1ef69e25afa8246568e72e83f70538a01391c032a75ea0c2eeafb2152947cfe9b1faab89799505604cfbb7977d89257b5729d7