Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe
-
Size
246KB
-
MD5
0eb3110a59a9c09f9ec345b532cdcf01
-
SHA1
d94b723e0e91aa2327d7226e13568f58a5c1924e
-
SHA256
fbafb6b128655b2ad00f28b883d3039102cc69b9d659081408fd1940439bfce0
-
SHA512
59eabd2b9dabea0fb55fd69ddb5d3c7ad9dd62bd05fa88598ee2e7ae49e2a7ebc987aa588be28e6c8f1db3380a6ad20c781dece2c820b7c90787ee4d5a99de56
-
SSDEEP
6144:WKEACiVXkncv3TyZjVGGT+KaYhhq+4I8Elrgw:nr7VXkcby7GGaYhQwl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 tuhan.exe -
Loads dropped DLL 4 IoCs
pid Process 2724 cmd.exe 2724 cmd.exe 2000 tuhan.exe 2000 tuhan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2536 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1196 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2000 tuhan.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2000 tuhan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2536 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2000 tuhan.exe 2000 tuhan.exe 2000 tuhan.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2000 tuhan.exe 2000 tuhan.exe 2000 tuhan.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2724 2952 0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe 28 PID 2952 wrote to memory of 2724 2952 0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe 28 PID 2952 wrote to memory of 2724 2952 0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe 28 PID 2952 wrote to memory of 2724 2952 0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe 28 PID 2724 wrote to memory of 2536 2724 cmd.exe 30 PID 2724 wrote to memory of 2536 2724 cmd.exe 30 PID 2724 wrote to memory of 2536 2724 cmd.exe 30 PID 2724 wrote to memory of 2536 2724 cmd.exe 30 PID 2724 wrote to memory of 1196 2724 cmd.exe 32 PID 2724 wrote to memory of 1196 2724 cmd.exe 32 PID 2724 wrote to memory of 1196 2724 cmd.exe 32 PID 2724 wrote to memory of 1196 2724 cmd.exe 32 PID 2724 wrote to memory of 2000 2724 cmd.exe 33 PID 2724 wrote to memory of 2000 2724 cmd.exe 33 PID 2724 wrote to memory of 2000 2724 cmd.exe 33 PID 2724 wrote to memory of 2000 2724 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2952 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\0eb3110a59a9c09f9ec345b532cdcf01_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\tuhan.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 29523⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:1196
-
-
C:\Users\Admin\AppData\Local\tuhan.exeC:\Users\Admin\AppData\Local\tuhan.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD50eb3110a59a9c09f9ec345b532cdcf01
SHA1d94b723e0e91aa2327d7226e13568f58a5c1924e
SHA256fbafb6b128655b2ad00f28b883d3039102cc69b9d659081408fd1940439bfce0
SHA51259eabd2b9dabea0fb55fd69ddb5d3c7ad9dd62bd05fa88598ee2e7ae49e2a7ebc987aa588be28e6c8f1db3380a6ad20c781dece2c820b7c90787ee4d5a99de56