Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe
-
Size
327KB
-
MD5
24c84ae368efbc0b5583d0fc54514bd2
-
SHA1
58d5e57d0249d399eeb77731009c075f0a3a8411
-
SHA256
0895b48d37c15eb1995eb025bf8d5d5127fbc5dd227a7f7698d6c49c8a8c881c
-
SHA512
08de057d31396452e556df6de4eb07c307d0e48a556ea6414523b48e3fa7d0333dfde5de6142d6cc2ec41a6f02a7b3af7383dfd4636318379316478d7d32afbf
-
SSDEEP
6144:uaNQ9sxwuJdznuZ30X23eLnIXQ/YCKIDbNEOD0M96dVoz:uanbs30XnIevDbNME
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1668 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 ubcxktwolp.exe -
Loads dropped DLL 3 IoCs
pid Process 1668 cmd.exe 1668 cmd.exe 2700 ubcxktwolp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2388 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2644 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2388 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe 2700 ubcxktwolp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1668 2392 24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe 28 PID 2392 wrote to memory of 1668 2392 24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe 28 PID 2392 wrote to memory of 1668 2392 24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe 28 PID 2392 wrote to memory of 1668 2392 24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe 28 PID 1668 wrote to memory of 2388 1668 cmd.exe 30 PID 1668 wrote to memory of 2388 1668 cmd.exe 30 PID 1668 wrote to memory of 2388 1668 cmd.exe 30 PID 1668 wrote to memory of 2388 1668 cmd.exe 30 PID 1668 wrote to memory of 2644 1668 cmd.exe 32 PID 1668 wrote to memory of 2644 1668 cmd.exe 32 PID 1668 wrote to memory of 2644 1668 cmd.exe 32 PID 1668 wrote to memory of 2644 1668 cmd.exe 32 PID 1668 wrote to memory of 2700 1668 cmd.exe 33 PID 1668 wrote to memory of 2700 1668 cmd.exe 33 PID 1668 wrote to memory of 2700 1668 cmd.exe 33 PID 1668 wrote to memory of 2700 1668 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2392 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\24c84ae368efbc0b5583d0fc54514bd2_JaffaCakes118.exe" & start C:\Users\Admin\AppData\Local\UBCXKT~1.EXE -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 23923⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2644
-
-
C:\Users\Admin\AppData\Local\ubcxktwolp.exeC:\Users\Admin\AppData\Local\UBCXKT~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD524c84ae368efbc0b5583d0fc54514bd2
SHA158d5e57d0249d399eeb77731009c075f0a3a8411
SHA2560895b48d37c15eb1995eb025bf8d5d5127fbc5dd227a7f7698d6c49c8a8c881c
SHA51208de057d31396452e556df6de4eb07c307d0e48a556ea6414523b48e3fa7d0333dfde5de6142d6cc2ec41a6f02a7b3af7383dfd4636318379316478d7d32afbf