Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe
-
Size
390KB
-
MD5
23361342f83b0e3bdb16342b9826c6a1
-
SHA1
723fa58f4d583a39dbf05239c8c522333d8984dc
-
SHA256
11234ea136d4510b6c5e7f1123d02ca1b5a8d5d38ea017a38b8dd3dfa61ab880
-
SHA512
d2fb2e3cc3fde52b95b3a1fd89bfd03171c971dcc688b578a93f70bdac93240196979eca78d3279eb3f26062cd5849ae54cca4aa7e68c8668a7faaf45d10996e
-
SSDEEP
12288:Hb2l7v8t0u63yNFTUnaNNQrJw6TndaBuv0xV88:Halot0FsFTUafQdwMnnI3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1940 services.exe -
Loads dropped DLL 2 IoCs
pid Process 2968 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe 2968 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\system\\services.exe" 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\system\ha_server_lang.ini services.exe File created C:\Windows\system\ha_server.ini 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe File created C:\Windows\system\services.exe 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe File opened for modification C:\Windows\system\ha_server.ini services.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1940 services.exe 1940 services.exe 1940 services.exe 1940 services.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1940 services.exe 1940 services.exe 1940 services.exe 1940 services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1940 2968 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe 28 PID 2968 wrote to memory of 1940 2968 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe 28 PID 2968 wrote to memory of 1940 2968 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe 28 PID 2968 wrote to memory of 1940 2968 23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system\services.exeC:\Windows\system\services.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223B
MD5b94bd79d028986b5f155e63d5f93be09
SHA1c7bf6d43055b0e9be06c00b8b14b0172c320ffd6
SHA2562ea6c1069a25378b03878d391cb50a3f795f2df362daaecfb0339c9dfd823be0
SHA512978df27dc84b6246ce4eedc02c9d08f2a6bfed144e3139691b9a7f21775dd85ab1d13bf82a57462adff1a444e2164120cc180f5f8b3e58592e42f2ee32282d18
-
Filesize
1KB
MD5aad4a95f28cbc98c4b0fe19a46c90535
SHA1cad2ecc478944819b55c5d62683c96d9f605fb25
SHA256592f372c9666cbaed25df0541dc43974ce01d82833525f7330c3f9da55c0d4bc
SHA512a5c39df4d4ec1ce1c42ec2dfb2f9b3f94524b4fe33d8c5e66c418d80fdf03256615f33f00643979e093f26ca010f5adc13efd4194e7ad6a322231f70aa4fd15c
-
Filesize
304KB
MD558716b4cfbf9dca9746798a50ea57202
SHA1a13d1b59a99a29727c81194014f6bdaa3c9e366f
SHA25632af77cac8915cd17874097228eb020a29cb1b7482427886e4609977d74804d4
SHA51234567e4cd26305bda2daaf576a1d767c623d844836156d6126021eaa26c5a3f541104833bafe3d3b1a67498302b9e2a2c918be202dcacc9b091957ac973dbaa6