Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 06:27
Behavioral task
behavioral1
Sample
03a0258a9278f97b91d579260448d441_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
03a0258a9278f97b91d579260448d441_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
03a0258a9278f97b91d579260448d441_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
03a0258a9278f97b91d579260448d441
-
SHA1
d212dcbd2cb15a0fbfee7f5f72a97da18e80f56e
-
SHA256
0cd630cd90f23a11b1219d0a0ba525eb6d63b204b4b035edac6bd28647db14e4
-
SHA512
44ca961f6decfd81776b601e104dea886b6eb22803b0d7b913802f1709da4b97c700749ea9a241bd70d6fa63b534894eddb1a897ec2a2e0a68e73507075a9319
-
SSDEEP
24576:gL1LillQEbHh0FE5egqtijDg7qh689k+ZESOh8AqppyCQ7qnrfI9mbcTQu32kbXN:NlQEb2Mv0ijSZaXZESg8B0CQ+nM9sckS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2100-3-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2100-4-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2100-6-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-33-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-40-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-41-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-39-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-38-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-42-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-35-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-34-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-32-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-30-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-29-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-28-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-27-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-26-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-24-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-22-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-11-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-31-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-25-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-23-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-21-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-20-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-18-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2100-19-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-17-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-16-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-15-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-13-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-44-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-45-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-43-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-47-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-49-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-50-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-46-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/memory/2984-48-0x0000000000400000-0x0000000000713000-memory.dmp themida behavioral1/files/0x0007000000014ed9-76.dat themida behavioral1/memory/2984-81-0x0000000000400000-0x0000000000713000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\DbaufmQ = "c:\\ProgramData\\AahdpoE\\RjvilkW\\DbaufmQ.exe" notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 2984 2100 03a0258a9278f97b91d579260448d441_JaffaCakes118.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2100 03a0258a9278f97b91d579260448d441_JaffaCakes118.exe 2984 notepad.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2984 2100 03a0258a9278f97b91d579260448d441_JaffaCakes118.exe 28 PID 2100 wrote to memory of 2984 2100 03a0258a9278f97b91d579260448d441_JaffaCakes118.exe 28 PID 2100 wrote to memory of 2984 2100 03a0258a9278f97b91d579260448d441_JaffaCakes118.exe 28 PID 2100 wrote to memory of 2984 2100 03a0258a9278f97b91d579260448d441_JaffaCakes118.exe 28 PID 2100 wrote to memory of 2984 2100 03a0258a9278f97b91d579260448d441_JaffaCakes118.exe 28 PID 2100 wrote to memory of 2984 2100 03a0258a9278f97b91d579260448d441_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\03a0258a9278f97b91d579260448d441_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03a0258a9278f97b91d579260448d441_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD503a0258a9278f97b91d579260448d441
SHA1d212dcbd2cb15a0fbfee7f5f72a97da18e80f56e
SHA2560cd630cd90f23a11b1219d0a0ba525eb6d63b204b4b035edac6bd28647db14e4
SHA51244ca961f6decfd81776b601e104dea886b6eb22803b0d7b913802f1709da4b97c700749ea9a241bd70d6fa63b534894eddb1a897ec2a2e0a68e73507075a9319