Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe
-
Size
193KB
-
MD5
172960eb458db73204724b8b2fb3ce31
-
SHA1
8e2881f4b11786fa7750c42074434ba7f7d5df86
-
SHA256
6eb12481f267482543fdb2f9b759b8035631930e3e90d1626c95fbff5669373a
-
SHA512
39fb686fa649f5f6f100a256aad4584f8cb1a5950901b9972e4ce850ab21c767423def3fb528d1bf4682d396c72f41894c3dbe43c36f20703d03941c28d4f62e
-
SSDEEP
3072:f/vGHqJLx6B/CRLdhH+5GWp1icKAArDZz4N9GhbkrNEkBNJAQ8lwzhAFPp//gO:HWqA/eR2p0yN90QEHpHgO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2132 server.exe -
Loads dropped DLL 2 IoCs
pid Process 3060 172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe 3060 172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2132 server.exe 2132 server.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2132 3060 172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2132 3060 172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2132 3060 172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe 28 PID 3060 wrote to memory of 2132 3060 172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe 28 PID 2132 wrote to memory of 1380 2132 server.exe 21 PID 2132 wrote to memory of 1380 2132 server.exe 21 PID 2132 wrote to memory of 1380 2132 server.exe 21 PID 2132 wrote to memory of 1380 2132 server.exe 21 PID 2132 wrote to memory of 1380 2132 server.exe 21 PID 2132 wrote to memory of 1380 2132 server.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\172960eb458db73204724b8b2fb3ce31_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5c2e7287a680ed59525acadc7ba991736
SHA1751d1c704d5aa9210293cf869e52308a9c34fe3c
SHA256ec0bef04d4aa2fb3cd8a75824a13c7b90bf4928405501a590b73d0cccc5911d2
SHA5120012864cadf8c674d8f1c7a2e5c736c5a1473037dead88bd561853dc192d291ac19fad7a776001fdf39abcbafb9d125e72c83304d280113c9810433b6d270167