Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 12:02
Static task
static1
Behavioral task
behavioral1
Sample
22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe
-
Size
396KB
-
MD5
22552fdf9bf05a39830e320f42dfb885
-
SHA1
e681132e6d51637a653090a9fa9493a60acbe970
-
SHA256
166a8aa00a7c8a394185fa603ef3f18397e06b3b6c3bbd97ed1fa004f823bfd1
-
SHA512
dbe06be90c11ac23f2e9e9bb246fa8f739cfd9a88cb45dd0c770ba10790b47e41051a03f240bdb59ddd1ec8e6b4f02b88faf457e712f7f9786a2d7ece766517a
-
SSDEEP
6144:CTamke9CMFWRfd04Puj9zdSXXzAepy+iA3lWzyKKihrlPIZ230s+XY+msNPEcj:yk0vo8j9zeXzDynCW2KvZ+XljPHj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2944 eB42900PkCeJ42900.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 eB42900PkCeJ42900.exe -
Loads dropped DLL 2 IoCs
pid Process 3016 22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe 3016 22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/3016-3-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/memory/3016-18-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/memory/2944-25-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/memory/2944-29-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/memory/2944-38-0x0000000000400000-0x00000000004F0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\eB42900PkCeJ42900 = "C:\\ProgramData\\eB42900PkCeJ42900\\eB42900PkCeJ42900.exe" eB42900PkCeJ42900.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main eB42900PkCeJ42900.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3016 22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3016 22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe Token: SeDebugPrivilege 2944 eB42900PkCeJ42900.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2944 eB42900PkCeJ42900.exe 2944 eB42900PkCeJ42900.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2944 3016 22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2944 3016 22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2944 3016 22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe 28 PID 3016 wrote to memory of 2944 3016 22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\ProgramData\eB42900PkCeJ42900\eB42900PkCeJ42900.exe"C:\ProgramData\eB42900PkCeJ42900\eB42900PkCeJ42900.exe" "C:\Users\Admin\AppData\Local\Temp\22552fdf9bf05a39830e320f42dfb885_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5ec8bb65fde2aeac677d55d6a4ab0d135
SHA19bc28b57b33f22774e02f215bc3da8449f80c859
SHA256c2b00d21dd58386d5455016dc27382c2ab5adb0a1ea3d67621b19d3dd7844b74
SHA512717e9135d426e35034182405c26c6bb00e753edc7c9dbdf1061cd08d4c2a5fb242fb61a0c0b3b39db20b7e044e357e63d42b637e6639d3ca57de375155aa1f12
-
Filesize
396KB
MD555c0631b7e8d70555b3971c167d188e0
SHA1c4b93532e87aac02a150f51275916c0b9889620b
SHA2564ca2c9fc8e60990166e7c4075d7dada136cb3c39231bf04b12f7acfbe41c1dcd
SHA512b01b990dff8fd61a3c0303498e26a6f244464f6708bff0f9dcce1d96b9bbf8ecd449d00625066e694be8663124e90455605a585f21d269ec4d3609c244c7ecea