Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe
-
Size
421KB
-
MD5
0e17525af642b2bef2055627f07a642c
-
SHA1
c8e281a9321f5f64312936ecaa4e073c49062d76
-
SHA256
aee18524a93d9c90c55a666b63d39a38d0addcdd828862557a51aa14c5736f62
-
SHA512
f06a843f0d2f9a45fc38f1ea605383f06e60f5c5f2a9a67d97404e992f58037313852d223c240545b7b9ca8a93aab4ba44c006d5a915abbc24c4b0e4d218f033
-
SSDEEP
12288:JWCnSOH7d2RwAkPPBX0zpXH4KAX7yaDlELqD9:hnSe70RtokZ4t7nKLQ
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 2656 msmmnger.exe 316 msmmnger.exe 1800 msmmnger.exe 2888 msmmnger.exe 1868 msmmnger.exe 1652 msmmnger.exe 900 msmmnger.exe 2860 msmmnger.exe 2996 msmmnger.exe 1816 msmmnger.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine 0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe Key opened \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Wine msmmnger.exe -
Loads dropped DLL 20 IoCs
pid Process 1724 0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe 1724 0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe 2656 msmmnger.exe 2656 msmmnger.exe 316 msmmnger.exe 316 msmmnger.exe 1800 msmmnger.exe 1800 msmmnger.exe 2888 msmmnger.exe 2888 msmmnger.exe 1868 msmmnger.exe 1868 msmmnger.exe 1652 msmmnger.exe 1652 msmmnger.exe 900 msmmnger.exe 900 msmmnger.exe 2860 msmmnger.exe 2860 msmmnger.exe 2996 msmmnger.exe 2996 msmmnger.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\msmmnger.exe 0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe 0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File created C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe File opened for modification C:\Windows\SysWOW64\msmmnger.exe msmmnger.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2656 1724 0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe 28 PID 1724 wrote to memory of 2656 1724 0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe 28 PID 1724 wrote to memory of 2656 1724 0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe 28 PID 1724 wrote to memory of 2656 1724 0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe 28 PID 2656 wrote to memory of 316 2656 msmmnger.exe 29 PID 2656 wrote to memory of 316 2656 msmmnger.exe 29 PID 2656 wrote to memory of 316 2656 msmmnger.exe 29 PID 2656 wrote to memory of 316 2656 msmmnger.exe 29 PID 316 wrote to memory of 1800 316 msmmnger.exe 30 PID 316 wrote to memory of 1800 316 msmmnger.exe 30 PID 316 wrote to memory of 1800 316 msmmnger.exe 30 PID 316 wrote to memory of 1800 316 msmmnger.exe 30 PID 1800 wrote to memory of 2888 1800 msmmnger.exe 33 PID 1800 wrote to memory of 2888 1800 msmmnger.exe 33 PID 1800 wrote to memory of 2888 1800 msmmnger.exe 33 PID 1800 wrote to memory of 2888 1800 msmmnger.exe 33 PID 2888 wrote to memory of 1868 2888 msmmnger.exe 34 PID 2888 wrote to memory of 1868 2888 msmmnger.exe 34 PID 2888 wrote to memory of 1868 2888 msmmnger.exe 34 PID 2888 wrote to memory of 1868 2888 msmmnger.exe 34 PID 1868 wrote to memory of 1652 1868 msmmnger.exe 35 PID 1868 wrote to memory of 1652 1868 msmmnger.exe 35 PID 1868 wrote to memory of 1652 1868 msmmnger.exe 35 PID 1868 wrote to memory of 1652 1868 msmmnger.exe 35 PID 1652 wrote to memory of 900 1652 msmmnger.exe 36 PID 1652 wrote to memory of 900 1652 msmmnger.exe 36 PID 1652 wrote to memory of 900 1652 msmmnger.exe 36 PID 1652 wrote to memory of 900 1652 msmmnger.exe 36 PID 900 wrote to memory of 2860 900 msmmnger.exe 37 PID 900 wrote to memory of 2860 900 msmmnger.exe 37 PID 900 wrote to memory of 2860 900 msmmnger.exe 37 PID 900 wrote to memory of 2860 900 msmmnger.exe 37 PID 2860 wrote to memory of 2996 2860 msmmnger.exe 38 PID 2860 wrote to memory of 2996 2860 msmmnger.exe 38 PID 2860 wrote to memory of 2996 2860 msmmnger.exe 38 PID 2860 wrote to memory of 2996 2860 msmmnger.exe 38 PID 2996 wrote to memory of 1816 2996 msmmnger.exe 39 PID 2996 wrote to memory of 1816 2996 msmmnger.exe 39 PID 2996 wrote to memory of 1816 2996 msmmnger.exe 39 PID 2996 wrote to memory of 1816 2996 msmmnger.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 616 "C:\Users\Admin\AppData\Local\Temp\0e17525af642b2bef2055627f07a642c_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 688 "C:\Windows\SysWOW64\msmmnger.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 692 "C:\Windows\SysWOW64\msmmnger.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 700 "C:\Windows\SysWOW64\msmmnger.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 696 "C:\Windows\SysWOW64\msmmnger.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 716 "C:\Windows\SysWOW64\msmmnger.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 708 "C:\Windows\SysWOW64\msmmnger.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 712 "C:\Windows\SysWOW64\msmmnger.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 732 "C:\Windows\SysWOW64\msmmnger.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\msmmnger.exeC:\Windows\system32\msmmnger.exe 720 "C:\Windows\SysWOW64\msmmnger.exe"11⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:1816
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
421KB
MD50e17525af642b2bef2055627f07a642c
SHA1c8e281a9321f5f64312936ecaa4e073c49062d76
SHA256aee18524a93d9c90c55a666b63d39a38d0addcdd828862557a51aa14c5736f62
SHA512f06a843f0d2f9a45fc38f1ea605383f06e60f5c5f2a9a67d97404e992f58037313852d223c240545b7b9ca8a93aab4ba44c006d5a915abbc24c4b0e4d218f033