Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
724bd3998ed...18.exe
windows7-x64
724bd3998ed...18.exe
windows10-2004-x64
7$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMPImg/C...04.exe
windows7-x64
1$TEMPImg/C...04.exe
windows10-2004-x64
1$TEMPImg/regver.exe
windows7-x64
1$TEMPImg/regver.exe
windows10-2004-x64
1DataDiskDoctor.exe
windows7-x64
7DataDiskDoctor.exe
windows10-2004-x64
7Uninst.exe
windows7-x64
7Uninst.exe
windows10-2004-x64
7$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 05:09
Behavioral task
behavioral1
Sample
24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$TEMPImg/CheckVer104.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
$TEMPImg/CheckVer104.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$TEMPImg/regver.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$TEMPImg/regver.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
DataDiskDoctor.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
DataDiskDoctor.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Uninst.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Uninst.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20240508-en
General
-
Target
24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe
-
Size
696KB
-
MD5
24bd3998edbc7549f50201cce7b9a11c
-
SHA1
713f191a4b99967af3c019765931a9624fdc8830
-
SHA256
1472780b22a70f13e6aec3ffd06fc9714748841f9f88c3c3b743d247d9711d68
-
SHA512
ca1adc1f5a27711442187e7032c1e1bee8d4c56313531dce2f2de817b4d3ddb31d7ed05a2ba4edba41ff1bcd30c15501a3f4468419b8179631d47fdcfe2eec03
-
SSDEEP
12288:IF9COQM7p6I76cLkjTisIessEnq9+uJ7zk+nG8R5+YIHf8pw5a4EcseV:yxrYBfhcnq3JhG8RobEpcaTi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2640 CheckVer104.exe 2980 regver.exe -
Loads dropped DLL 9 IoCs
pid Process 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 2980 regver.exe 2980 regver.exe 2640 CheckVer104.exe 2640 CheckVer104.exe 2640 CheckVer104.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main regver.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2640 CheckVer104.exe 2640 CheckVer104.exe 2980 regver.exe 2980 regver.exe 2980 regver.exe 2980 regver.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2640 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2640 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2640 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2640 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2640 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2640 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2640 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 28 PID 2116 wrote to memory of 2980 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2980 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2980 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2980 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2980 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2980 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 29 PID 2116 wrote to memory of 2980 2116 24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24bd3998edbc7549f50201cce7b9a11c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\TempImg\CheckVer104.exeC:\Users\Admin\AppData\Local\TempImg\CheckVer104.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
C:\Users\Admin\AppData\Local\TempImg\regver.exeC:\Users\Admin\AppData\Local\TempImg\regver.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD5ce6f8d719b60d52df5230c90ce5f2eed
SHA1a82f4101fd501bf86d883c0edd607353c596fc2e
SHA2569679b74f2737bd8b257ccbc24e8aff54614b6250a188527d3938bc92a43fffa2
SHA5126c7405d53d4ae301204853bbcfef51bebf721ac2895b2381ea718a82763b8d9e11b4ee724ca75d1998c9ecdc6735a60f9be6bb8946bcce2a20fd4dce8f8e4c4c
-
Filesize
332KB
MD5fa199dffc4991a36725e1a2d272e787e
SHA168c1db76a8080782e3f450e3f724e4e1564b18f6
SHA25613c8453cb118d3f9d2dc2a1189633ab10162f902758320487f03daf124c4bb9e
SHA5128dc6a2369dc87148ac45cd6ae37f33fcb32c4fd863d17f6166a41c7a4ef40edd6a4da0f57536f382e550add791bf678a5116e0f1cb440649be1b924c3a31a520
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b
-
Filesize
290KB
MD59181b183dd3096301e7211ed0312de8a
SHA10c321747b581ad79da70dc9aab183cc12c3bbefd
SHA256202fcecc53f1ffd2d1d85cc4cc79a24ae37285ce564e15615b5d13ca69487968
SHA5125316e0511746c75603ba02eaf79b9aafbb29356f94279f466d3f17e9894082f14cf052ca3b8f52a149815e8c9b58f5d4b02ef1dcc3d677dc27032480f788adf7
-
Filesize
5KB
MD5a7cd6206240484c8436c66afb12bdfbf
SHA10bb3e24a7eb0a9e5a8eae06b1c6e7551a7ec9919
SHA25669ac56d2fdf3c71b766d3cc49b33b36f1287cc2503310811017467dfcb455926
SHA512b9ee7803301e50a8ec20ab3f87eb9e509ea24d11a69e90005f30c1666acc4ed0a208bd56e372e2e5c6a6d901d45f04a12427303d74761983593d10b344c79904
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667