Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe
-
Size
240KB
-
MD5
14e9af2b3b387642887c9e545ac248d2
-
SHA1
0d25004347da456697ef8c4ddbf8e8ecdc606972
-
SHA256
495ae62a0acba8cd23585cf6bbb8e35ca2944c9028816ec66ffe7248f63455e6
-
SHA512
590c3b34ff4e7536e673700f4e0b2fdde96a97b0c6f36e0a6387bb24806f16def37625bf62213fd348a14237984193b6b65ba9b9eb0194f0e39df8d65e1be32b
-
SSDEEP
6144:m8g/7ixgAHtuypsUb+MlLwIPXD5OkkQ4tMZqdQsyBd+ptEs:mzeWildh1wIPXD5OkkQ4uqdQD6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1080 server.exe 2772 server.exe -
Loads dropped DLL 6 IoCs
pid Process 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 1080 server.exe 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 2772 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1080 server.exe 1080 server.exe 2772 server.exe 2772 server.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1080 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 28 PID 2132 wrote to memory of 1080 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 28 PID 2132 wrote to memory of 1080 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 28 PID 2132 wrote to memory of 1080 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 28 PID 2132 wrote to memory of 1080 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 28 PID 2132 wrote to memory of 1080 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 28 PID 2132 wrote to memory of 1080 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 28 PID 1080 wrote to memory of 1204 1080 server.exe 21 PID 1080 wrote to memory of 1204 1080 server.exe 21 PID 1080 wrote to memory of 1204 1080 server.exe 21 PID 1080 wrote to memory of 1204 1080 server.exe 21 PID 2132 wrote to memory of 2772 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 29 PID 2132 wrote to memory of 2772 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 29 PID 2132 wrote to memory of 2772 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 29 PID 2132 wrote to memory of 2772 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 29 PID 2132 wrote to memory of 2772 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 29 PID 2132 wrote to memory of 2772 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 29 PID 2132 wrote to memory of 2772 2132 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 29 PID 2772 wrote to memory of 1204 2772 server.exe 21 PID 2772 wrote to memory of 1204 2772 server.exe 21 PID 2772 wrote to memory of 1204 2772 server.exe 21 PID 2772 wrote to memory of 1204 2772 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5fa5391fcdd6bf8a40a0b9183d00b8c22
SHA1b489da2cf80ee8c3f7f93fba3432c10e463b4567
SHA256b629d536476f47e272a9ab722e2925c706747ae57f946e0c9bd6b7336568761f
SHA5123b58d52cec2b6f163bdb11dab7162ccb0fe663d2d748848aa36ac0ecfaa2fe8ce731b7446760e33a3afe63b53b9785988754381c19d36e01427cbcf707a721f0