Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe
-
Size
323KB
-
MD5
01ddf9694d1ff1a058991d6862a3a962
-
SHA1
999913d1d26d0f4de8d881b0bd8b282bd022d9c2
-
SHA256
a27caecefb4045af12b437359a746abf5f0100ac072af8c1a583ccf80326dfad
-
SHA512
2dc74c355c7e0f2bb9e52ce0b78795f55019d76e4f602b2af65001528330de96ecd07eeb33936b9b0692e674dfe426db9fa248f3fdabd68bf476de84c34ba599
-
SSDEEP
3072:5B8Nu8xX7Oer7GVlT6At9gMNNy9sEeR7Kw1lmGSKM4hMpCygCCcxXbsPC35ynqoI:b8Nu8QsCVHmGtn2tpCFMflokFnNKK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1272 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1800 ywavh.exe -
Loads dropped DLL 2 IoCs
pid Process 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E8BE2F68-5812-AD4F-F172-4D96D7386E8B} = "C:\\Users\\Admin\\AppData\\Roaming\\Lejye\\ywavh.exe" ywavh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1596 set thread context of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Privacy 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe 1800 ywavh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 1800 ywavh.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1596 wrote to memory of 1800 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 28 PID 1596 wrote to memory of 1800 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 28 PID 1596 wrote to memory of 1800 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 28 PID 1596 wrote to memory of 1800 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 28 PID 1800 wrote to memory of 1108 1800 ywavh.exe 19 PID 1800 wrote to memory of 1108 1800 ywavh.exe 19 PID 1800 wrote to memory of 1108 1800 ywavh.exe 19 PID 1800 wrote to memory of 1108 1800 ywavh.exe 19 PID 1800 wrote to memory of 1108 1800 ywavh.exe 19 PID 1800 wrote to memory of 1172 1800 ywavh.exe 20 PID 1800 wrote to memory of 1172 1800 ywavh.exe 20 PID 1800 wrote to memory of 1172 1800 ywavh.exe 20 PID 1800 wrote to memory of 1172 1800 ywavh.exe 20 PID 1800 wrote to memory of 1172 1800 ywavh.exe 20 PID 1800 wrote to memory of 1204 1800 ywavh.exe 21 PID 1800 wrote to memory of 1204 1800 ywavh.exe 21 PID 1800 wrote to memory of 1204 1800 ywavh.exe 21 PID 1800 wrote to memory of 1204 1800 ywavh.exe 21 PID 1800 wrote to memory of 1204 1800 ywavh.exe 21 PID 1800 wrote to memory of 1848 1800 ywavh.exe 23 PID 1800 wrote to memory of 1848 1800 ywavh.exe 23 PID 1800 wrote to memory of 1848 1800 ywavh.exe 23 PID 1800 wrote to memory of 1848 1800 ywavh.exe 23 PID 1800 wrote to memory of 1848 1800 ywavh.exe 23 PID 1800 wrote to memory of 1596 1800 ywavh.exe 27 PID 1800 wrote to memory of 1596 1800 ywavh.exe 27 PID 1800 wrote to memory of 1596 1800 ywavh.exe 27 PID 1800 wrote to memory of 1596 1800 ywavh.exe 27 PID 1800 wrote to memory of 1596 1800 ywavh.exe 27 PID 1596 wrote to memory of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29 PID 1596 wrote to memory of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29 PID 1596 wrote to memory of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29 PID 1596 wrote to memory of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29 PID 1596 wrote to memory of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29 PID 1596 wrote to memory of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29 PID 1596 wrote to memory of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29 PID 1596 wrote to memory of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29 PID 1596 wrote to memory of 1272 1596 01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\01ddf9694d1ff1a058991d6862a3a962_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\Lejye\ywavh.exe"C:\Users\Admin\AppData\Roaming\Lejye\ywavh.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf615c22a.bat"3⤵
- Deletes itself
PID:1272
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5a467324bfd2ca478d84959a1aa70d33c
SHA1bdcf86d0fbaa66b42c6746397b101b93e66a0a9f
SHA256a570a8bbb80ce2418bf24ef0a9f1f93b3db4a597e383ce027e8f89a4fdd5fb51
SHA512ae45238687076ed9833d3e39cdd31f09e2a5163631912012c22d4fd5c15a9d773b06999bb82f8f147bcf214b003d2d53122817579ea8e0623461bb80dd635818
-
Filesize
323KB
MD56711d9394ae25c560ec0c22ecfd8e7e4
SHA1e884bc246761964f585d84e56b590a3543b6384c
SHA256451519a8ffa3fd8677d50584c90218d74ecc6c0e66b59c9aa19143a48acee7fe
SHA512a19bf34ce1c4f8086aea859be76088afe394fd06ce4b97eaff4b16a051b0b1e37fb3b1be0a14586c417c5076d04c5c5d8572af0cc44d0103d51dd89f875db3f7