Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe
-
Size
188KB
-
MD5
01c9a70fb7e17f9d215f2346ac4055b5
-
SHA1
e975065193cdcb04cabd256dfbe631a033d772ac
-
SHA256
84924cc8e6a943ea4a7769379ad67178b4878809fc28a5552682ac6eea0e6c7d
-
SHA512
b4bc41789fcab4f88bfae56df8a4f49942c9ad867d53449e147f26fee4cdbd2f38b0d2b9d13280532a411c19d1d091763bfad809a0a925e5bee6db5d7919e498
-
SSDEEP
3072:U9m0jofzTJK5fICGdNEi1w7Z/WpEy5kym65jVA13usrF2y31uXzFaC:cmTTJsyNEhA5cMARusrAsuXzoC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2432 svhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1337 = "C:\\Windows\\system\\svhost.exe" reg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\1337logs\ofiara.0.htm svhost.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\system\svhost.exe xcopy.exe File created C:\Windows\system\wuaclt.exe xcopy.exe File created C:\Windows\1337.ini 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe File created C:\Windows\system\svhost.sd7 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe File opened for modification C:\Windows\system\wuaclt.exe xcopy.exe File created C:\Windows\bez tytu³u2.JPG 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe File created C:\Windows\system\svhost.sd 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe File created C:\Windows\system\wuaclt.sd 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe File opened for modification C:\Windows\system\svhost.exe xcopy.exe File created C:\Windows\system\wuaclt.sd7 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe File opened for modification C:\Windows\system xcopy.exe File opened for modification C:\Windows\bez tytu³u2.JPG DllHost.exe File opened for modification C:\Windows\1337.ini svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 DllHost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2368 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2368 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2368 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 28 PID 2880 wrote to memory of 2368 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 28 PID 2368 wrote to memory of 2156 2368 cmd.exe 30 PID 2368 wrote to memory of 2156 2368 cmd.exe 30 PID 2368 wrote to memory of 2156 2368 cmd.exe 30 PID 2368 wrote to memory of 2156 2368 cmd.exe 30 PID 2880 wrote to memory of 2892 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 32 PID 2880 wrote to memory of 2892 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 32 PID 2880 wrote to memory of 2892 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 32 PID 2880 wrote to memory of 2892 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 32 PID 2892 wrote to memory of 2576 2892 cmd.exe 34 PID 2892 wrote to memory of 2576 2892 cmd.exe 34 PID 2892 wrote to memory of 2576 2892 cmd.exe 34 PID 2892 wrote to memory of 2576 2892 cmd.exe 34 PID 2880 wrote to memory of 2596 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 35 PID 2880 wrote to memory of 2596 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 35 PID 2880 wrote to memory of 2596 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 35 PID 2880 wrote to memory of 2596 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 35 PID 2880 wrote to memory of 2432 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 37 PID 2880 wrote to memory of 2432 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 37 PID 2880 wrote to memory of 2432 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 37 PID 2880 wrote to memory of 2432 2880 01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01c9a70fb7e17f9d215f2346ac4055b5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /C REG ADD HKLM\software\microsoft\windows\currentversion\run /v 1337 /d %windir%\system\svhost.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\software\microsoft\windows\currentversion\run /v 1337 /d C:\Windows\system\svhost.exe3⤵
- Adds Run key to start application
PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C xcopy "%windir%\system\*.sd7" "%windir%\system\*.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Windows\system\*.sd7" "C:\Windows\system\*.exe"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy "%userprofile%\gadu-gadu\ja\config.dat" "%windir%\system32\1337logs\config.dat"2⤵PID:2596
-
-
C:\Windows\system\svhost.exe"C:\Windows\system\svhost.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2432
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD530efdbf73989806b5c748b1c22c53cb1
SHA15821cc1e89a9fda438c41b87712b188405367e06
SHA25625d109f34670c4a50311a913ed5ff005df87d8bb02ae8fe2b32fb6ff31339f29
SHA51297bcc62ca4dccb5a35791601d0d4245d8d4b7ce63068481248025422e2fed49ddfe4665bca15ff1c1a753a60921c8da4e701045055a2cc57a2da53ff25810b41
-
Filesize
69KB
MD5cb3667d77d12df2f1e630d07d6adfa28
SHA1b6478fd5b8f9f6bd7e3fa63458bef7c060f16e2e
SHA256dfcfa54daaf14067e4b4687924486b600727eb5c063f0899a6044830e1e3c78c
SHA5126bcf7625ce503036758c3b0522a1900c21641905d58f47c3fd40f7e583bb42b49d4edfaf703ed02bd4573c650b29a6f3f371e753a6f43d7495631328061ba7bd
-
Filesize
32KB
MD57c3d8955631512e938b8a2e0a3b82ade
SHA1d3b5c3d06088654e40796f461f7fead9eccf6147
SHA2564fdede0161ac67f8d0c9f01963e0eae52c6669ba06262ee30aca9d49c1a88103
SHA512a60d05ac1ea306158780eb291c657aa957b89db6dcfa24753e2160ecd71a36f2a17349a2185c3dab5d200d7fc9a5523d9466bc87d59ec032f315b1990c71d597
-
Filesize
24KB
MD5d283a06cd1bc40dbafc221cdfc323907
SHA14bd647cb10781699628ce2045367bce80db1243e
SHA25663c25587320cf0a6772f862d974a969b587a6e4f517a527c6ab5336042233445
SHA512d91dd62d7ae378a7fbf15aceff2917c91fdb54a9cc770aebfa6f327cabd507c18b6f6715b07620b96d571172df26d2947307938c3bd4fc5a83353bc499cbbdb9