Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
3s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 19:56
Behavioral task
behavioral1
Sample
17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Errors
General
-
Target
17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe
-
Size
31KB
-
MD5
17531f25cfacf2d072048f555e19b111
-
SHA1
de32e6bf5efcadd783a242d751c610266d1c366a
-
SHA256
e7975e4dce0f8070e0e99492d4bdd8e89b406ae48a36728daa1592b394cdfcbf
-
SHA512
84fd41ec6c1eda50e0cc7e2496b5652afc121a757bada8507564c5b821ede72456071841bc8e8f763848be9d459df00a333f452f92a8038286924be2e686895d
-
SSDEEP
768:iglI5snqq2fIk8Z2I90NQ66bfQgkKXwR:di5/7I90q6sEowR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2304 x2z8.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 x2z8.exe -
Loads dropped DLL 2 IoCs
pid Process 2928 17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe 2928 17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2928-0-0x000000002AA00000-0x000000002AA20000-memory.dmp upx behavioral1/files/0x0033000000014817-5.dat upx behavioral1/memory/2304-14-0x000000002AA00000-0x000000002AA20000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe File opened for modification \??\PHYSICALDRIVE0 x2z8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2304 x2z8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2304 2928 17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe 28 PID 2928 wrote to memory of 2304 2928 17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe 28 PID 2928 wrote to memory of 2304 2928 17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe 28 PID 2928 wrote to memory of 2304 2928 17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\17531f25cfacf2d072048f555e19b111_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\x2z8.exeC:\Users\Admin\AppData\Local\Temp\\x2z8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:3036
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84B
MD507de81e7531c6297eb5ede13a741bc6d
SHA18499cb17ba7e270f977eb360606eb8eedfe062ae
SHA25687d336ee045f5e1c4444babd06b46b01ec9f163658b5e6c4236d7f2effdcfe20
SHA5123cb9f87d46a590225beba3101622001647ed2864b25476ac0263fc48c5c990fe2381155a84cef94404649721206962f4cfc23d2d18d984775222a188ec2519c9
-
Filesize
31KB
MD517531f25cfacf2d072048f555e19b111
SHA1de32e6bf5efcadd783a242d751c610266d1c366a
SHA256e7975e4dce0f8070e0e99492d4bdd8e89b406ae48a36728daa1592b394cdfcbf
SHA51284fd41ec6c1eda50e0cc7e2496b5652afc121a757bada8507564c5b821ede72456071841bc8e8f763848be9d459df00a333f452f92a8038286924be2e686895d