Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
15a3732e63485462605874e1e279397a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
15a3732e63485462605874e1e279397a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
15a3732e63485462605874e1e279397a_JaffaCakes118.exe
-
Size
413KB
-
MD5
15a3732e63485462605874e1e279397a
-
SHA1
0ade985b167cded4448f006fa03063710897e557
-
SHA256
4ee83e4bac681bfe77f8e76a800985914be180c969c4494478ac2cf331efec39
-
SHA512
9d292d9c7a84d69d864c0f2c70ba20e16bd02078f53cbcd6f3e79bf0379e6d298356d8e9a0b72b1d6b899f536923bfb444d9bfdf4a8343ea337693003a0b71c1
-
SSDEEP
6144:s9Zc0DWKJaUns8OWukRLbXES7YkoLh4en2udAsSJU0eq4lDDhVSGsGZSYDR:q53JVspnkRLYSzo94czdFyU0e9lv5r
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 15a3732e63485462605874e1e279397a_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts scansock.exe File opened for modification C:\Windows\system32\drivers\etc\hosts sockhelp32.exe -
Executes dropped EXE 2 IoCs
pid Process 3040 scansock.exe 2112 sockhelp32.exe -
Loads dropped DLL 2 IoCs
pid Process 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 3040 scansock.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dnfhack.cy 15a3732e63485462605874e1e279397a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 3040 scansock.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 3040 scansock.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 3040 scansock.exe 2112 sockhelp32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3040 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 28 PID 2096 wrote to memory of 3040 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 28 PID 2096 wrote to memory of 3040 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 28 PID 2096 wrote to memory of 3040 2096 15a3732e63485462605874e1e279397a_JaffaCakes118.exe 28 PID 3040 wrote to memory of 2112 3040 scansock.exe 29 PID 3040 wrote to memory of 2112 3040 scansock.exe 29 PID 3040 wrote to memory of 2112 3040 scansock.exe 29 PID 3040 wrote to memory of 2112 3040 scansock.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\15a3732e63485462605874e1e279397a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15a3732e63485462605874e1e279397a_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\scansock.exe"C:\Users\Admin\AppData\Local\Temp\scansock.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\sockhelp32.exe"C:\Users\Admin\AppData\Local\Temp\sockhelp32.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
413KB
MD515a3732e63485462605874e1e279397a
SHA10ade985b167cded4448f006fa03063710897e557
SHA2564ee83e4bac681bfe77f8e76a800985914be180c969c4494478ac2cf331efec39
SHA5129d292d9c7a84d69d864c0f2c70ba20e16bd02078f53cbcd6f3e79bf0379e6d298356d8e9a0b72b1d6b899f536923bfb444d9bfdf4a8343ea337693003a0b71c1