Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe
-
Size
910KB
-
MD5
06b245bccd6cdf0e660844aabb58a902
-
SHA1
15e52cbf2967c1f5785385642a64f539ff2258e2
-
SHA256
d94f6bbe9dab952637db64a23a21db3a6858f33b61933692b24fdc2d901ebc5c
-
SHA512
4f4b7ff9b56e6833112558e57fe3e40a368c8cc0fe05adbda86bb076ef1256131d9919e39a02051f87e19cfcce557010bda3dec3746f710574ed2ce05afe6a7d
-
SSDEEP
12288:OJdYY9sTzIFi7ehqem71obL4avRIiZB3XEClFLm4i7ewxa4SzNqQNJBBhR1Pmx/:OjRF7d3UaFLPiwC0JZRsx/
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1928 1.exe 2368 1.exe 1008 1.exe -
Loads dropped DLL 4 IoCs
pid Process 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\1.exe = "C:\\WINDOWS\\1.exe" 1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\1.exe 1.exe File opened for modification C:\WINDOWS\1.exe 1.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1928 1.exe 1928 1.exe 2368 1.exe 2368 1.exe 1008 1.exe 1008 1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1928 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 28 PID 2420 wrote to memory of 1928 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 28 PID 2420 wrote to memory of 1928 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 28 PID 2420 wrote to memory of 1928 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 28 PID 1928 wrote to memory of 2368 1928 1.exe 29 PID 1928 wrote to memory of 2368 1928 1.exe 29 PID 1928 wrote to memory of 2368 1928 1.exe 29 PID 1928 wrote to memory of 2368 1928 1.exe 29 PID 2420 wrote to memory of 1008 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 30 PID 2420 wrote to memory of 1008 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 30 PID 2420 wrote to memory of 1008 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 30 PID 2420 wrote to memory of 1008 2420 06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06b245bccd6cdf0e660844aabb58a902_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\WINDOWS\1.exeC:\WINDOWS\1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
800KB
MD596f8f6776c060d8326d8d006d0a99dd4
SHA1f1c630a8ad5d884a71f1f9b7cedc4d8f7e1d081a
SHA256963d15f2b34fb0299f91e78d08ee82cce554447deea3689911964ab9482b1361
SHA512cb78185e8720f2522e25f51694577b2c6a4fc658aa4afe720d2a1bbbe0e954c7a34e5198f20c060bbdc4b68cb4a253e54b30dd702c2903b06007c2e96b175d21