Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe
-
Size
303KB
-
MD5
1683825345721f193d32ed79f078b3a9
-
SHA1
3c353248df9b18f6fbf2f41c61474a5e7d2fdd2a
-
SHA256
bfbb3ae8ccb79cd140f4fb02aa0f1c44337af673100d71ebdeff79e3df0a8440
-
SHA512
0f63ea2d9b2a29bcc5a0ed1e250de9d9c7fc8867978c37baa68d92e3ed984e501e9abfc611c97a50bceb56bcbf09a007729d60689049d506446cf6781a845f93
-
SSDEEP
6144:VWFbxMlwB442mNFzpKbkYAsdinem80uZS:VU/lpzKMB8RS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2340 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 qejyj.exe -
Loads dropped DLL 1 IoCs
pid Process 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F08D48C8-DA76-AD4E-F540-ECC2E1DBCFDF} = "C:\\Users\\Admin\\AppData\\Roaming\\Ivobv\\qejyj.exe" qejyj.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Privacy 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe 2892 qejyj.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 2892 qejyj.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2892 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 28 PID 1720 wrote to memory of 2892 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 28 PID 1720 wrote to memory of 2892 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 28 PID 1720 wrote to memory of 2892 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 28 PID 2892 wrote to memory of 1288 2892 qejyj.exe 19 PID 2892 wrote to memory of 1288 2892 qejyj.exe 19 PID 2892 wrote to memory of 1288 2892 qejyj.exe 19 PID 2892 wrote to memory of 1288 2892 qejyj.exe 19 PID 2892 wrote to memory of 1288 2892 qejyj.exe 19 PID 2892 wrote to memory of 1348 2892 qejyj.exe 20 PID 2892 wrote to memory of 1348 2892 qejyj.exe 20 PID 2892 wrote to memory of 1348 2892 qejyj.exe 20 PID 2892 wrote to memory of 1348 2892 qejyj.exe 20 PID 2892 wrote to memory of 1348 2892 qejyj.exe 20 PID 2892 wrote to memory of 1376 2892 qejyj.exe 21 PID 2892 wrote to memory of 1376 2892 qejyj.exe 21 PID 2892 wrote to memory of 1376 2892 qejyj.exe 21 PID 2892 wrote to memory of 1376 2892 qejyj.exe 21 PID 2892 wrote to memory of 1376 2892 qejyj.exe 21 PID 2892 wrote to memory of 772 2892 qejyj.exe 23 PID 2892 wrote to memory of 772 2892 qejyj.exe 23 PID 2892 wrote to memory of 772 2892 qejyj.exe 23 PID 2892 wrote to memory of 772 2892 qejyj.exe 23 PID 2892 wrote to memory of 772 2892 qejyj.exe 23 PID 2892 wrote to memory of 1720 2892 qejyj.exe 27 PID 2892 wrote to memory of 1720 2892 qejyj.exe 27 PID 2892 wrote to memory of 1720 2892 qejyj.exe 27 PID 2892 wrote to memory of 1720 2892 qejyj.exe 27 PID 2892 wrote to memory of 1720 2892 qejyj.exe 27 PID 1720 wrote to memory of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29 PID 1720 wrote to memory of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29 PID 1720 wrote to memory of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29 PID 1720 wrote to memory of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29 PID 1720 wrote to memory of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29 PID 1720 wrote to memory of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29 PID 1720 wrote to memory of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29 PID 1720 wrote to memory of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29 PID 1720 wrote to memory of 2340 1720 1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1288
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1348
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1683825345721f193d32ed79f078b3a9_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\Ivobv\qejyj.exe"C:\Users\Admin\AppData\Roaming\Ivobv\qejyj.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8ba24855.bat"3⤵
- Deletes itself
PID:2340
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5c89e6be0aa4fefb3fbbe6e621463c090
SHA1d2973bbd6f507f4c9c1dc8649f2065ed41fda0fc
SHA256a4b35b4a737dff4c9d11091ff040d404c3c1e043879b3b968c8023942a4693af
SHA512b4aed9143093a5e0d1a114157b077111d97316f4d225a85aee4acc45d498d4ac7dcb1c23d0b524f6e5a3b503dbbf4cf6fc4b0c25e95574216bdc500b7b972da7
-
Filesize
303KB
MD5cf471e35de894093870291b67c102180
SHA18ce29c8e90fc9a1f86f5d95d2547bd98f916e484
SHA25652696393c401f2ca4d0b216301c2062fd9fa72513dbe11c720704b9e67baba4a
SHA512f9d932619c6141e2c02a8849ee0b77d69c4f6dfca052952814a6fd91fd2dccdc6f705fd7465497b7c468146c7b67cac5eab17a0eb8ee4c77a0866eeb5f7a71f7