Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe
-
Size
184KB
-
MD5
00516819f47c52733da5fac9c272e0bf
-
SHA1
3e8b1ebca19cf046ddff95dc2450a8270074e16f
-
SHA256
5e80116d30921452a2a36ce53cbfd49796cdcb3d87e8070b37b698c92c3e3c30
-
SHA512
b8b13ddc8740c70ec6d53c7d2c6d3a1e6be234dece536c865fa99511d3197d51427ead68a5a45039787ef9ae84b84c15b1ecc84480e02a564b6315f137fc78d0
-
SSDEEP
3072:9WV2IlsHbK+yDjiDND7h5lPnZ+Am27PVA4mzNnKvPR3HR:wL+LDN7RvZp5S4mknR3x
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2196 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2196 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2196 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 28 PID 1824 wrote to memory of 2196 1824 00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe 28 PID 2196 wrote to memory of 2676 2196 cmd.exe 30 PID 2196 wrote to memory of 2676 2196 cmd.exe 30 PID 2196 wrote to memory of 2676 2196 cmd.exe 30 PID 2196 wrote to memory of 2676 2196 cmd.exe 30 PID 2196 wrote to memory of 2680 2196 cmd.exe 31 PID 2196 wrote to memory of 2680 2196 cmd.exe 31 PID 2196 wrote to memory of 2680 2196 cmd.exe 31 PID 2196 wrote to memory of 2680 2196 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2676 attrib.exe 2680 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\TY9PEO~1.DEF\storage\PERMAN~1\chrome\idb\165711~1.FIL\FF8TMP~1.BAT2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Local\Temp\00516819f47c52733da5fac9c272e0bf_JaffaCakes118.exe"3⤵
- Views/modifies file attributes
PID:2676
-
-
C:\Windows\SysWOW64\attrib.exeattrib -R -S -H "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ty9peokp.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.files\FF8.tmp.bat"3⤵
- Views/modifies file attributes
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\TY9PEO~1.DEF\storage\PERMAN~1\chrome\idb\165711~1.FIL\FF8.tmp.bat
Filesize664B
MD5781a1c60237c618380f6b02819070245
SHA170fabce8ed761894148584a3153363d6f74a3a8d
SHA256c7fabd8a49f9a63c072a5deb2bf4e5e2419fc6027c3145c139ee1c2c8fcca8d0
SHA512a5de9be3910f7a70ecba0dcd0bb3c73ffb10a6cd74c742a4fdceb86ae8f8b02911d8176233e91e53f8128c688301a4de4275175225112c5fc7df1c33b6eb8899