Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe
-
Size
361KB
-
MD5
0830238d0c569284c42bd0753f8fb3d5
-
SHA1
55d1e78303e9b914628df9ccc2c4d51085acd957
-
SHA256
7cc63f0d42487ed301de77481fe896f93be281fe9e43d485a6b66251587050de
-
SHA512
e46e21ad844cceaf70597673ed343dc59aa6d0d2f6b8babbbbca0614e3e8f8e91cdd97fc5878285eefbb3d7787ca31ac04bc99e392570feacf875913536999b1
-
SSDEEP
6144:+867Jmm4lnW2PRTTC0VRNhP+WsnxiP8Auom:+5P4IWBhVPnsno8rF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2236 zexise.exe -
Loads dropped DLL 2 IoCs
pid Process 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D8EAE6C8-7DED-AD4F-4306-79414A995A5C} = "C:\\Users\\Admin\\AppData\\Roaming\\Haabyw\\zexise.exe" zexise.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2804 set thread context of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Privacy 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe 2236 zexise.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 2236 zexise.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2236 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2236 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2236 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2236 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 28 PID 2236 wrote to memory of 1108 2236 zexise.exe 19 PID 2236 wrote to memory of 1108 2236 zexise.exe 19 PID 2236 wrote to memory of 1108 2236 zexise.exe 19 PID 2236 wrote to memory of 1108 2236 zexise.exe 19 PID 2236 wrote to memory of 1108 2236 zexise.exe 19 PID 2236 wrote to memory of 1172 2236 zexise.exe 20 PID 2236 wrote to memory of 1172 2236 zexise.exe 20 PID 2236 wrote to memory of 1172 2236 zexise.exe 20 PID 2236 wrote to memory of 1172 2236 zexise.exe 20 PID 2236 wrote to memory of 1172 2236 zexise.exe 20 PID 2236 wrote to memory of 1200 2236 zexise.exe 21 PID 2236 wrote to memory of 1200 2236 zexise.exe 21 PID 2236 wrote to memory of 1200 2236 zexise.exe 21 PID 2236 wrote to memory of 1200 2236 zexise.exe 21 PID 2236 wrote to memory of 1200 2236 zexise.exe 21 PID 2236 wrote to memory of 1940 2236 zexise.exe 23 PID 2236 wrote to memory of 1940 2236 zexise.exe 23 PID 2236 wrote to memory of 1940 2236 zexise.exe 23 PID 2236 wrote to memory of 1940 2236 zexise.exe 23 PID 2236 wrote to memory of 1940 2236 zexise.exe 23 PID 2236 wrote to memory of 2804 2236 zexise.exe 27 PID 2236 wrote to memory of 2804 2236 zexise.exe 27 PID 2236 wrote to memory of 2804 2236 zexise.exe 27 PID 2236 wrote to memory of 2804 2236 zexise.exe 27 PID 2236 wrote to memory of 2804 2236 zexise.exe 27 PID 2804 wrote to memory of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 PID 2804 wrote to memory of 2824 2804 0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe 29 PID 2236 wrote to memory of 1856 2236 zexise.exe 33 PID 2236 wrote to memory of 1856 2236 zexise.exe 33 PID 2236 wrote to memory of 1856 2236 zexise.exe 33 PID 2236 wrote to memory of 1856 2236 zexise.exe 33 PID 2236 wrote to memory of 1856 2236 zexise.exe 33 PID 2236 wrote to memory of 1064 2236 zexise.exe 34 PID 2236 wrote to memory of 1064 2236 zexise.exe 34 PID 2236 wrote to memory of 1064 2236 zexise.exe 34 PID 2236 wrote to memory of 1064 2236 zexise.exe 34 PID 2236 wrote to memory of 1064 2236 zexise.exe 34
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0830238d0c569284c42bd0753f8fb3d5_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\Haabyw\zexise.exe"C:\Users\Admin\AppData\Roaming\Haabyw\zexise.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2236
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpccc4f4dc.bat"3⤵
- Deletes itself
PID:2824
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1940
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1856
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD590146fcdeae5c748a0bef03b8d5a1ecb
SHA1a64754d90f6fb2e0f3cfe5e5169d5abee6430b93
SHA256e07e77f3dc7d57d8fb81e1565967a148a57cc5bbcfff29887fee0d9d3dbb01ff
SHA5128b5cbe184b3c6c77ec5a6e6f95f61e10006757bd741f159d3b6f1b5baa30b3976668668cd94a5e7f446fb5308a20fd69b5ebf529c6840690e269e379540b1a52
-
Filesize
361KB
MD5e3baf2a9261d87fa3a5e702e054ce379
SHA19e15e1e624f314832b521d8596f12d1ce1b3ea03
SHA25639b49aed0df2d98b2cf339831a1643d2e006aae459b97991182170b83aac484f
SHA512c5aaa7b66f8f95303d2c62fbb4257a06b7bcd22622703db60ebfcddb102d6298c3c611e421f0de05ca6a90302a153ac11040f82d5229cb4ebb9e559689daecab