Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe
-
Size
232KB
-
MD5
17feeaf5cdac502ee8e0bb8382589567
-
SHA1
115830f44accfe72a660839117546dedee9a6d0d
-
SHA256
6fd410ff47452c097076374512ac6e1e74231b64d6af08e8090e997977a0fe7b
-
SHA512
06d2dcd4c99f3762076c404c4d8c0b44fb99f5412a44d215b5ec7be24c6765b3abe9327502c63be646bcf5fdedd85483db51f7404f3ef077707aced2a368eb07
-
SSDEEP
6144:okDwgTmSBCtpRkRR4n1vXiF5ePYz3cHBKvZZYO+Ea:Lt3ByEn4VyF0LIBZYlEa
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b000000012279-2.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 2752 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\T: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\X: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\B: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\I: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\M: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\O: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\Q: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\Y: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\Z: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\A: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\K: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\L: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\U: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\W: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\G: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\H: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\J: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\N: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\P: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\E: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\R: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe File opened (read-only) \??\V: 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2752 17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17feeaf5cdac502ee8e0bb8382589567_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5685f1cbd4af30a1d0c25f252d399a666
SHA16a1b978f5e6150b88c8634146f1406ed97d2f134
SHA2560e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4
SHA5126555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9