Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe
-
Size
1023KB
-
MD5
226e2664e8ffffa616981d2117136d24
-
SHA1
d7604be93df1fefc391152e46f8fecdd35721471
-
SHA256
188745a9a4866634060354bd55e843a95c3bbafd64356b311124b0ed811e36cd
-
SHA512
cfa687c469f57938c6e22d8fa98140233c06ccdc50ed40b50a94101b42a96de983c80bf785aa1a4ff86f90e0e5d84ea934dd59585963c1beaaff2b28f1949320
-
SSDEEP
24576:pINHFxsApPWwb6DXFfO+4hg4wZBCrlyT6S+JDH7BiiU3eDR2Cy/:pAHFf8wb6DZOjh0aO+HQu92Z
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2540 uharc.exe 2452 uharc.exe 2260 curl.exe 1724 uharc.exe 1236 curl.exe -
Loads dropped DLL 14 IoCs
pid Process 2508 cmd.exe 2508 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2260 curl.exe 2260 curl.exe 272 cmd.exe 272 cmd.exe 272 cmd.exe 272 cmd.exe 1236 curl.exe 1236 curl.exe -
resource yara_rule behavioral1/files/0x0008000000016c38-10.dat upx behavioral1/memory/2508-13-0x00000000022A0000-0x0000000002333000-memory.dmp upx behavioral1/memory/2540-29-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral1/memory/2452-34-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral1/memory/2452-51-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral1/memory/1724-70-0x0000000000400000-0x0000000000493000-memory.dmp upx behavioral1/memory/272-69-0x00000000004D0000-0x0000000000563000-memory.dmp upx behavioral1/memory/1724-85-0x0000000000400000-0x0000000000493000-memory.dmp upx -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 2468 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2600 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2260 curl.exe 1236 curl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2888 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2888 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2888 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2888 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 29 PID 3036 wrote to memory of 2660 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2660 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2660 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2660 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 30 PID 3036 wrote to memory of 2468 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 31 PID 3036 wrote to memory of 2468 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 31 PID 3036 wrote to memory of 2468 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 31 PID 3036 wrote to memory of 2468 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 31 PID 2468 wrote to memory of 2944 2468 cmd.exe 32 PID 2468 wrote to memory of 2944 2468 cmd.exe 32 PID 2468 wrote to memory of 2944 2468 cmd.exe 32 PID 2468 wrote to memory of 2944 2468 cmd.exe 32 PID 3036 wrote to memory of 2884 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 33 PID 3036 wrote to memory of 2884 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 33 PID 3036 wrote to memory of 2884 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 33 PID 3036 wrote to memory of 2884 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 33 PID 3036 wrote to memory of 2488 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 34 PID 3036 wrote to memory of 2488 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 34 PID 3036 wrote to memory of 2488 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 34 PID 3036 wrote to memory of 2488 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 34 PID 3036 wrote to memory of 2524 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 35 PID 3036 wrote to memory of 2524 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 35 PID 3036 wrote to memory of 2524 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 35 PID 3036 wrote to memory of 2524 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 35 PID 3036 wrote to memory of 2572 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 36 PID 3036 wrote to memory of 2572 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 36 PID 3036 wrote to memory of 2572 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 36 PID 3036 wrote to memory of 2572 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 36 PID 3036 wrote to memory of 2592 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 37 PID 3036 wrote to memory of 2592 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 37 PID 3036 wrote to memory of 2592 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 37 PID 3036 wrote to memory of 2592 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 37 PID 3036 wrote to memory of 2604 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 38 PID 3036 wrote to memory of 2604 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 38 PID 3036 wrote to memory of 2604 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 38 PID 3036 wrote to memory of 2604 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 38 PID 3036 wrote to memory of 2568 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 39 PID 3036 wrote to memory of 2568 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 39 PID 3036 wrote to memory of 2568 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 39 PID 3036 wrote to memory of 2568 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 39 PID 3036 wrote to memory of 2508 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 40 PID 3036 wrote to memory of 2508 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 40 PID 3036 wrote to memory of 2508 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 40 PID 3036 wrote to memory of 2508 3036 226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe 40 PID 2508 wrote to memory of 2620 2508 cmd.exe 41 PID 2508 wrote to memory of 2620 2508 cmd.exe 41 PID 2508 wrote to memory of 2620 2508 cmd.exe 41 PID 2508 wrote to memory of 2620 2508 cmd.exe 41 PID 2620 wrote to memory of 2600 2620 cmd.exe 42 PID 2620 wrote to memory of 2600 2620 cmd.exe 42 PID 2620 wrote to memory of 2600 2620 cmd.exe 42 PID 2620 wrote to memory of 2600 2620 cmd.exe 42 PID 2620 wrote to memory of 2384 2620 cmd.exe 43 PID 2620 wrote to memory of 2384 2620 cmd.exe 43 PID 2620 wrote to memory of 2384 2620 cmd.exe 43 PID 2620 wrote to memory of 2384 2620 cmd.exe 43 PID 2508 wrote to memory of 2540 2508 cmd.exe 44 PID 2508 wrote to memory of 2540 2508 cmd.exe 44 PID 2508 wrote to memory of 2540 2508 cmd.exe 44 PID 2508 wrote to memory of 2540 2508 cmd.exe 44 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2944 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\226e2664e8ffffa616981d2117136d24_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\afolder" mkdir "C:\Users\Admin\AppData\Local\Temp\afolder"2⤵PID:2888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\ztmp" mkdir "C:\Users\Admin\AppData\Local\Temp\ztmp"2⤵PID:2660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\ztmp2⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\ztmp3⤵
- Views/modifies file attributes
PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\afolder\check_inet.bat" del "C:\Users\Admin\AppData\Local\Temp\afolder\check_inet.bat"2⤵PID:2884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\afolder\sendmail.exe" del "C:\Users\Admin\AppData\Local\Temp\afolder\sendmail.exe"2⤵PID:2488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\afolder\dwn_util.bat" del "C:\Users\Admin\AppData\Local\Temp\afolder\dwn_util.bat"2⤵PID:2524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\afolder\curl.uha" del "C:\Users\Admin\AppData\Local\Temp\afolder\curl.uha"2⤵PID:2572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\afolder\uharc.exe" del "C:\Users\Admin\AppData\Local\Temp\afolder\uharc.exe"2⤵PID:2592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5000.bat" del "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5000.bat"2⤵PID:2604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5052.exe" del "C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5052.exe"2⤵PID:2568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\ztmp\tmp5000.bat2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\afolder\check_inet.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\PING.EXEPING -n 1 www.google.com4⤵
- Runs ping.exe
PID:2600
-
-
C:\Windows\SysWOW64\find.exefind "Reply from "4⤵PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\afolder\uharc.exe"C:\Users\Admin\AppData\Local\Temp\afolder\uharc.exe" x -t"C:\Users\Admin\AppData\Local\Temp\bisc" -y+ C:\Users\Admin\AppData\Local\Temp\afolder\curl.uha3⤵
- Executes dropped EXE
PID:2540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\afolder\dwn_util.bat"3⤵
- Loads dropped DLL
PID:2372 -
C:\Windows\SysWOW64\mode.commode con: lines=104⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\afolder\uharc.exe"C:\Users\Admin\AppData\Local\Temp\afolder\uharc.exe" x -t"C:\Users\Admin\AppData\Local\Temp\bisc" -y+ C:\Users\Admin\AppData\Local\Temp\afolder\curl.uha4⤵
- Executes dropped EXE
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\bisc\curl.exe""C:\Users\Admin\AppData\Local\Temp\bisc\curl"" --progress-bar -o "C:\Users\Admin\AppData\Local\Temp\bisc\diag_rem_v.txt " "http://www.modyouri.com/bisc_files/cur_diag_rem_v.txt "4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
-
C:\Windows\SysWOW64\fc.exefc "C:\Users\Admin\AppData\Local\Temp\bisc\cur_diag_rem_v.txt" "C:\Users\Admin\AppData\Local\Temp\bisc\diag_rem_v.txt"3⤵PID:292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\afolder\dwn_util.bat"3⤵
- Loads dropped DLL
PID:272 -
C:\Windows\SysWOW64\mode.commode con: lines=104⤵PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\afolder\uharc.exe"C:\Users\Admin\AppData\Local\Temp\afolder\uharc.exe" x -t"C:\Users\Admin\AppData\Local\Temp\bisc" -y+ C:\Users\Admin\AppData\Local\Temp\afolder\curl.uha4⤵
- Executes dropped EXE
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\bisc\curl.exe""C:\Users\Admin\AppData\Local\Temp\bisc\curl"" --progress-bar -o "C:\Users\Admin\AppData\Local\Temp\bisc\diag_rem_v.txt " "http://www.modyouri.com/bisc_files/cur_diag_rem_v.txt "4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
7B
MD5be768f6945cb6d45d3b42d55f5b70aea
SHA10d8d84046fc096097a7ad7a2d8754e2039cfbe61
SHA2564a0f4ca43af103ffb3c1c659297f28760fee2be3d3bf57d52cf2ecaa7021ae52
SHA5124fda073ad949fc717a48d5b9f1365dd94fdb38173d0e3797a1fad88bc8897a6c073e2273a03a367feb14a39f161957f6411865c73ece16a2d5b19cf6fda091b4
-
Filesize
664B
MD5581b6ba034bc84910287bc2b4d71ab58
SHA181b241cda9516e6db484f2dbbff3c0eb641b9186
SHA2562d805f58c664b6be4e6d6aba5af0c7d07c4bf173981f36a62011c50809862ed4
SHA51243a89e66f4804d233a98c855d0c4b20c439a0258d3231e399ad0c063535e57ba1f38cf2ba699b7f09e376330f0f412569d7def771d831911e9643199c32774b9
-
Filesize
816KB
MD5045bb7f6767536d2734a82bfa907a88c
SHA1d661d2d131d4df532f9375c1953b4e3b5cb5d8a6
SHA256105c7728959c59efaee6c23b5ec90e1e0b243a2b21855313fca015ee1b45d8bd
SHA51261d9a8a7fb00fda4d24a89473b9ada4da8ba6b0b72157e7d19105e525efd4d9fffe36c8de57b19576d20510b8922081c807f057d971dfffa66d6885d4bd96bdb
-
Filesize
1KB
MD508b1e6c236cf405c8eaf2174f47f840d
SHA14885088aa42193f2e81692084a74fe38d63e779e
SHA2560720c8786ae5b0064637392be0706e82524737f34249abf5b6b94b74c952a6e5
SHA51217fe6ee6f3d7ab0cdbee18f66ae412c35535b6e4d6d5cae2d04caab2230cfa16ef4fb0a8b1d980972c333261ef9620f8df035eedead6c71ab531079f58b20f7b
-
Filesize
118KB
MD5e44e350bba5be866612211e8d56e0ed1
SHA110ec6d2a1d3d43d0e597eb8eb01478faf033a4be
SHA256fcc49a15f22ceafbf97411dd9e1cd693309b5f9aec967426e631ff7c2b0cb2dc
SHA51245181ec10bfca7542a98cce08395e9243dab84444664975cf3bf92e2b4c70585273858c9a5789dfb7578ef98bf3b895afcf80f2bf89e2b5680650cb72d657a69
-
Filesize
432KB
MD542d74927a0f4f583fb4a43c6841f0da1
SHA184e0ddb2b0fd27a72d5e5caaf19d2323babeedd0
SHA256a5666c0d1ab708994ee1636d0cbe8cec759378d764a6704e20c31a505f19809c
SHA51201e3d5423c49a484cd1ffb295bbdd4583fa70d08549b0c42b283f0a31bfe799bdda95d3452f19cf59e288545dce248972de7e1b37db7f23bd4c292baa8df7093
-
Filesize
322KB
MD5659c79fbe882e54c44f3bd39f073d7c0
SHA1d684bab7481def64c5e75d1732b69bbd6ca2ffb3
SHA256ea7c540a7e59596a8793bd00d742ca5f86db7022be03465b6967285c1667c849
SHA5120ea0483774c09a99deaf9a26372ea9308c719f1b5dbc6b9413ecdb89a3e4cc1b36e8a59f7dcddbd76c0e683d5169c9271f997eee465b0ea927264ec514d45245
-
Filesize
1.5MB
MD5923fad7854959d5e971bcb787a699f3c
SHA141a72dd510b5f08d9a2cf4a0dacf3fbb76ddb2ca
SHA2569018baac15d34cfd47f092a3c9c12ba1c5ddb910a4692187174d8f09f193e5f8
SHA5124f367d95468d7c27647d2e9626006908ca1c5d786c6e364953f83bc81df5248e7fba0468097fc017d1ac48f77526ebaaad77c4c1e49712a2381de8bf3e159660
-
Filesize
346KB
MD5b394f91a8069216775f87749253dbe82
SHA1d82f8cf2f2198fb60dddfd1ab4deec47b3b70657
SHA2560f22abb27e6572b0bd383fec50076dd9898cd2f3366551bb51f2856697d11c19
SHA51286dfccfee8693b2a6ad2265fbaa3f472569e3ae4725dae8224ba9cacaf11aa2e4f9a9ff9d41620d42f41c91df758c8a76008242e148c88e3a6b216dda8ef65d5
-
Filesize
7KB
MD5d2cf7a973c2d6873d97feafd4ffb43b5
SHA1e798bd30e61e3a637d5e164af354c23a5997384a
SHA256efb2e031002673d45048b92dece2db83a90c262d97808d381c7497cc45075acb
SHA512b1094ce8344518791334c88848be85cc885b56861a9d6a45cf51db1879d0b74a40fb3b08b06178a2f6038d1616b6a7ff91e50b0626ee6859fd3cc0f1f2554b47
-
Filesize
101KB
MD550f6270de215776eb6e9ab43c2367f90
SHA1a2f0be6b23b6a923c402d6893e7e3c50e89a1132
SHA256f0a425fc7159c0311fcf32a03c80e24f40b273d199ce95defe470786087f822a
SHA5126dac8fbf961c41832000623092247b1deccf288a4fe32c4f028e89eb485b8d1713012038af955a87674beeaba92c0bc9ef47c4c10242bc3953b2b1a0e53431ac