Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe
-
Size
192KB
-
MD5
176e52512209fb6e15396cb8393f6fa8
-
SHA1
b00baa1c50de8b44b3fd493dcd5cce30d80fb7cb
-
SHA256
07797de96091eb1834817520d51d4eb40d5a0cf18f10765dba3f2e3578928ce9
-
SHA512
519da4cd4d0a812a306578d787ad542546bf2af1365ebff16fd5cbc6a0c054bdd45bd3ad14143e2d03ad73c35ff0470f4bfcd42a35d8c44696ee4bd65e564430
-
SSDEEP
3072:7kCTeuBtRP++rx61R1Ov81tkfRDx8DeWZvlEgH562gyCxbr5eRYWEpQj/5WZKzaT:7kCquBfP++rx6D1P1ER2DtlEgZ6nzZee
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2964-1-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/3016-11-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/3016-14-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/3016-13-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2964-74-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2772-76-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral1/memory/2964-182-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3016 2964 176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3016 2964 176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3016 2964 176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe 28 PID 2964 wrote to memory of 3016 2964 176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe 28 PID 2964 wrote to memory of 2772 2964 176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2772 2964 176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2772 2964 176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe 30 PID 2964 wrote to memory of 2772 2964 176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\176e52512209fb6e15396cb8393f6fa8_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50591d8b986f4fdc576150719baa5f246
SHA110f8e40fbc16f340758591175316433ca1a1e53c
SHA256030c703078d9e9a747390222ec2595c2fffa604b37ef55aafee5b509ca7f1299
SHA51250aee9ecbca8a8b6aaf078d3531e79f5f61b18e043712939514f775ffc36567d18b01edd700e987db01c0921541294750db2fd95d7a24781c4d5e51798a201ce
-
Filesize
600B
MD570ccbe6d40a109069b6cfeb6ca54f0a2
SHA100cac0ab4493113b879c33a4eb29cc640d9648e8
SHA256b8cdadd7c4fda31e78955a3f0ef6d38d1b8aa8021bad7508f1600170c88479c1
SHA512502235a1e943808760e1605415892bc3ff314a4b0dded44996c9fea5521ffa583e07170d385e59916166e5f5a7e13d4212b6d0860efdf3bfa16d0cb2eab50a96
-
Filesize
996B
MD509b0a24fe601866e345371204de116ba
SHA145b9c168b4e5e413a0544c8bd2ea296a81ba240c
SHA2566ec1fc4af50d4b978cc4017fb1ba76d49bf48bd0214343884e044d970df82570
SHA512eb13f601bf190fb41cbca1252e6957767159968a5a7ef29789518bdcb5d2c369bd26071809dd42b2abcd586498a233b9213629127d582757d9bdfca3f6ac8072