Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 06:42
Behavioral task
behavioral1
Sample
1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
1927d5a81b3828dad2dcd9c70716f94d
-
SHA1
14f35671f902d849e240fb58c9cdcad0789d240f
-
SHA256
1c9940693fab631038ecce7f5b3a24d64b85e9a5de89d2db0bcc96bec23fea72
-
SHA512
9913634319ef1210c3bb61c602515d7975774b5d8fd0006c9789067a1292e746a8380c1b5f553195679cfa3ac68441a23e5f76364c61f7bc74df6c4e7aea2f8f
-
SSDEEP
24576:cuYOHRLthh3zCvKNvU1jExgSs2oZP8bkVzzmuAhFEJmQFe:S4hhBUCvDe2oZlzjAZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2628 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 44181321.exe -
Loads dropped DLL 4 IoCs
pid Process 2148 cmd.exe 2148 cmd.exe 2816 44181321.exe 2816 44181321.exe -
resource yara_rule behavioral1/files/0x00350000000141aa-17.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\44181321 = "C:\\ProgramData\\44181321\\44181321.exe" 1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\44181321 = "C:\\PROGRA~3\\44181321\\44181321.exe" 44181321.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2664 taskkill.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2816 44181321.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2664 taskkill.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe 2816 44181321.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2628 2460 1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe 28 PID 2460 wrote to memory of 2628 2460 1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe 28 PID 2460 wrote to memory of 2628 2460 1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe 28 PID 2460 wrote to memory of 2628 2460 1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe 28 PID 2628 wrote to memory of 2664 2628 cmd.exe 30 PID 2628 wrote to memory of 2664 2628 cmd.exe 30 PID 2628 wrote to memory of 2664 2628 cmd.exe 30 PID 2628 wrote to memory of 2664 2628 cmd.exe 30 PID 2628 wrote to memory of 2148 2628 cmd.exe 32 PID 2628 wrote to memory of 2148 2628 cmd.exe 32 PID 2628 wrote to memory of 2148 2628 cmd.exe 32 PID 2628 wrote to memory of 2148 2628 cmd.exe 32 PID 2148 wrote to memory of 2816 2148 cmd.exe 33 PID 2148 wrote to memory of 2816 2148 cmd.exe 33 PID 2148 wrote to memory of 2816 2148 cmd.exe 33 PID 2148 wrote to memory of 2816 2148 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\44181321\44181321.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 1927d5a81b3828dad2dcd9c70716f94d_JaffaCakes118.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\44181321\44181321.exe /install3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\PROGRA~3\44181321\44181321.exeC:\PROGRA~3\44181321\44181321.exe /install4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD53e6693f5937742dcc324f8d2538a5665
SHA1a51448ac58bc5749cf91332cd68dfb5579ac0e1d
SHA256b4e59f7301feba341222e3bb438a6dace8ef3c751a4aab02dcadde13c1b78360
SHA512e91d65f3f5e8c0944314fa1e7a913a92e7808acc77354c0e1bee0114263b804cc2d0760b580b251178254114e5a25e9ec78556892e15f2d78a420c9d476949c2
-
Filesize
1.1MB
MD51927d5a81b3828dad2dcd9c70716f94d
SHA114f35671f902d849e240fb58c9cdcad0789d240f
SHA2561c9940693fab631038ecce7f5b3a24d64b85e9a5de89d2db0bcc96bec23fea72
SHA5129913634319ef1210c3bb61c602515d7975774b5d8fd0006c9789067a1292e746a8380c1b5f553195679cfa3ac68441a23e5f76364c61f7bc74df6c4e7aea2f8f