Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe
-
Size
13KB
-
MD5
163a231e3e1ef7611e0a189c7fa20296
-
SHA1
e6aea52cab2c5419ffd95f2d6eff721b1c1e6afe
-
SHA256
e048c53f51d4a2fd1076717353b1de92fdb778f7eb8b517aa4cbcd5373b5ce64
-
SHA512
992af61c0ba2c5d8f15421a3f5f1b4c996d526275f7f6f43b7cb017124d7d0d93bcd841ca8252290d828f95616125bed119c1fe8cf588f8e670e3bb6b855fe4a
-
SSDEEP
192:kmIFYOjh2hJA9rvfGBHGt1R3YUkcYCxiACb+tKFKokBPYYHLYao3szQEyjjjaFUW:kmI6AoJwfGBHGFvxFCbcRYKzvoi
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\dispexcb.dll = "{76D44356-B494-443a-BEDC-AA68DE4255E6}" 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2648 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\dispexcb.tmp 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\dispexcb.tmp 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\dispexcb.nls 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6} 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6}\InProcServer32 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6}\InProcServer32\ = "C:\\Windows\\SysWow64\\dispexcb.dll" 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{76D44356-B494-443a-BEDC-AA68DE4255E6}\InProcServer32\ThreadingModel = "Apartment" 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2648 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2648 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe 2648 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe 2648 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2808 2648 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe 28 PID 2648 wrote to memory of 2808 2648 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe 28 PID 2648 wrote to memory of 2808 2648 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe 28 PID 2648 wrote to memory of 2808 2648 163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\163a231e3e1ef7611e0a189c7fa20296_JaffaCakes118.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7D3B.tmp.bat2⤵
- Deletes itself
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207B
MD56e62a1f32805bbba10a24aa05bbc7c95
SHA1ef5090c0ebeb16cc9ac445aadc42a06cf271796d
SHA256b67d4e7e2651ff1c704b97eeedafd07b09cc3cbc039156939dc09a4f62ec7afd
SHA512e1850544202344eb20334c7bbc85ab88e401cefa2a0637963c4a00c7e6a200f28b86760d386a62395ac357246c7387d4595aca50d921e6eb13ead77283fcfe4b
-
Filesize
428B
MD5376d39c1f584196deed675a8fcdd5ac8
SHA17ae9917b886e636e6b1ceb32e79690061f681f0a
SHA2562e4defe7ffadb416b77549cbbb0162459e186b81f399d64982f659ff5b0d5f8e
SHA5127e6ff25110c6ec41af0f53cd3bea50380366a53756f0956686e206295d464d80f1668c197b36bc8884f6f4336a4beaf2836fea3b9dbc9c80385f26ae51712a77
-
Filesize
881KB
MD569e727fb50d7f8e2eea6aa1868b6ff35
SHA15e2e641b19ac59c1d72db95798c137514b1857c0
SHA2562aaef341db19802c5a4886e6530ca6d0f7cb73c38e4257593b9fe14d16bf6cbf
SHA51296a93ef5b9e6b0cbecbcf756038e5a8365f7c61e720772a1279a699071745aab7b0b7814d2e66b2e11d6b1acfafa5abc1498d17cc578bb8de1a8583b6158513e