Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe
-
Size
320KB
-
MD5
0bb45e497330ef8c9ed1ca274eb9ce27
-
SHA1
1d1b3714c49ebe2a4178b781c167172f3b67a1dd
-
SHA256
59c17ec28fcb56972773b6251ee11452d75680c70bcef518b36c4e7acbc13a78
-
SHA512
c68f3993fa380e30d3360ffb1a54efef7628553fa7ab88a07848faffe0d3cddeb052990c30b34e5e5d112921debed3083bfc3298520f88d0ef41d8fbea9f1c29
-
SSDEEP
6144:HIag9cljL5EDqLhKMtIog+IVLk10DjCrUEM7C:onW5dhxtam10DuDMO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2552 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2560 reji.exe 2572 reji.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Windows\CurrentVersion\Run\{D8EAE6C8-7DED-AD4F-4306-79414A995A5C} = "C:\\Users\\Admin\\AppData\\Roaming\\Okyj\\reji.exe" reji.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1876 set thread context of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 2560 set thread context of 2572 2560 reji.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Privacy 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe 2572 reji.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 1876 wrote to memory of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 1876 wrote to memory of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 1876 wrote to memory of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 1876 wrote to memory of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 1876 wrote to memory of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 1876 wrote to memory of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 1876 wrote to memory of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 1876 wrote to memory of 2136 1876 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 28 PID 2136 wrote to memory of 2560 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 29 PID 2136 wrote to memory of 2560 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 29 PID 2136 wrote to memory of 2560 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 29 PID 2136 wrote to memory of 2560 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 29 PID 2560 wrote to memory of 2572 2560 reji.exe 30 PID 2560 wrote to memory of 2572 2560 reji.exe 30 PID 2560 wrote to memory of 2572 2560 reji.exe 30 PID 2560 wrote to memory of 2572 2560 reji.exe 30 PID 2560 wrote to memory of 2572 2560 reji.exe 30 PID 2560 wrote to memory of 2572 2560 reji.exe 30 PID 2560 wrote to memory of 2572 2560 reji.exe 30 PID 2560 wrote to memory of 2572 2560 reji.exe 30 PID 2560 wrote to memory of 2572 2560 reji.exe 30 PID 2572 wrote to memory of 1056 2572 reji.exe 18 PID 2572 wrote to memory of 1056 2572 reji.exe 18 PID 2572 wrote to memory of 1056 2572 reji.exe 18 PID 2572 wrote to memory of 1056 2572 reji.exe 18 PID 2572 wrote to memory of 1056 2572 reji.exe 18 PID 2572 wrote to memory of 1120 2572 reji.exe 19 PID 2572 wrote to memory of 1120 2572 reji.exe 19 PID 2572 wrote to memory of 1120 2572 reji.exe 19 PID 2572 wrote to memory of 1120 2572 reji.exe 19 PID 2572 wrote to memory of 1120 2572 reji.exe 19 PID 2572 wrote to memory of 1176 2572 reji.exe 21 PID 2572 wrote to memory of 1176 2572 reji.exe 21 PID 2572 wrote to memory of 1176 2572 reji.exe 21 PID 2572 wrote to memory of 1176 2572 reji.exe 21 PID 2572 wrote to memory of 1176 2572 reji.exe 21 PID 2572 wrote to memory of 1956 2572 reji.exe 23 PID 2572 wrote to memory of 1956 2572 reji.exe 23 PID 2572 wrote to memory of 1956 2572 reji.exe 23 PID 2572 wrote to memory of 1956 2572 reji.exe 23 PID 2572 wrote to memory of 1956 2572 reji.exe 23 PID 2572 wrote to memory of 2136 2572 reji.exe 28 PID 2572 wrote to memory of 2136 2572 reji.exe 28 PID 2572 wrote to memory of 2136 2572 reji.exe 28 PID 2572 wrote to memory of 2136 2572 reji.exe 28 PID 2572 wrote to memory of 2136 2572 reji.exe 28 PID 2572 wrote to memory of 2552 2572 reji.exe 31 PID 2572 wrote to memory of 2552 2572 reji.exe 31 PID 2572 wrote to memory of 2552 2572 reji.exe 31 PID 2572 wrote to memory of 2552 2572 reji.exe 31 PID 2572 wrote to memory of 2552 2572 reji.exe 31 PID 2136 wrote to memory of 2552 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 31 PID 2136 wrote to memory of 2552 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 31 PID 2136 wrote to memory of 2552 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 31 PID 2136 wrote to memory of 2552 2136 0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1056
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1120
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0bb45e497330ef8c9ed1ca274eb9ce27_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\Okyj\reji.exe"C:\Users\Admin\AppData\Roaming\Okyj\reji.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Roaming\Okyj\reji.exe"C:\Users\Admin\AppData\Roaming\Okyj\reji.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpcbe8d1c3.bat"4⤵
- Deletes itself
PID:2552
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD53a5cc926e1142bedf8ce7a2bcd445147
SHA1dbfc33d15bceef20a9e00af0db64dcc7c61af34e
SHA25613bb51bee2459ce5ac16d35bb6c44653c36a37c17b9a93a3568df444cf07d94c
SHA5121e74a500a95c1350d6ee0db3070008f6a333ade96e1c08633a2eb0b592ac56ac3f89407bc17cf2a84b124fa67f4918f853cf64fa6ecda6a4e2b8296595c8cba2
-
Filesize
320KB
MD555f3f79706af0139b998574a079a8f11
SHA1dbb38f38636db507a411cdd849adbce76fe87415
SHA256a3c963467a27dc12af0be29e592aea7e85b58e26f4abd204b30d3d847a8ea9e6
SHA5125d2f7820eef4fa0afcca252fe8b45524a6d0464b91840d19e18ee5a357a12c2e4df3d8b53e88840f813ab76be1d00082b005d4899d935e20d179038ed1961ca5