Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe
-
Size
687KB
-
MD5
297cfffd13c7e3d3926cd12bbcd1230d
-
SHA1
8bdb7df5a4a6747275cbba18867f0cb75c38d885
-
SHA256
2d41e607b68a0969d74933498e0233164b9f3c956a38ba6199e6044e1613ea9b
-
SHA512
9fd42327a2fa6497e51f476bc973da51cd7b13a0950f90813f65a5efb1526d430cf3e0691e543b0826e3a6d31d35087962aff65e37a64caf5ee82c9f78e7588d
-
SSDEEP
12288:9oNj0REt++19BvWzvbM2LJR1+UXV81UXdIF3Z4mxxVjHWlPXGexomQ4/g:9oV1+iY3M2FR1+0e1UXdIQmXCee+2/g
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3060 3.exe 2848 winnutpc.exe -
Loads dropped DLL 2 IoCs
pid Process 2552 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe 2552 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\winnutpc.exe 3.exe File opened for modification C:\Windows\winnutpc.exe 3.exe File created C:\Windows\uninstal.bat 3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3060 3.exe Token: SeDebugPrivilege 2848 winnutpc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 winnutpc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2552 wrote to memory of 3060 2552 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe 30 PID 2552 wrote to memory of 3060 2552 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe 30 PID 2552 wrote to memory of 3060 2552 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe 30 PID 2552 wrote to memory of 3060 2552 297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe 30 PID 2848 wrote to memory of 3068 2848 winnutpc.exe 32 PID 2848 wrote to memory of 3068 2848 winnutpc.exe 32 PID 2848 wrote to memory of 3068 2848 winnutpc.exe 32 PID 2848 wrote to memory of 3068 2848 winnutpc.exe 32 PID 3060 wrote to memory of 688 3060 3.exe 33 PID 3060 wrote to memory of 688 3060 3.exe 33 PID 3060 wrote to memory of 688 3060 3.exe 33 PID 3060 wrote to memory of 688 3060 3.exe 33 PID 3060 wrote to memory of 688 3060 3.exe 33 PID 3060 wrote to memory of 688 3060 3.exe 33 PID 3060 wrote to memory of 688 3060 3.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat3⤵PID:688
-
-
-
C:\Windows\winnutpc.exeC:\Windows\winnutpc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD567e4ea2c3e65d3236c8266b9c116f67f
SHA17e87f925ccd68b2b7c9af9f92e118db1990234f9
SHA2562dff6c390d03870cec06d16fe0191475fb87ad2330b78d03c15e7ff0bed8f00c
SHA5121a3cf0443e932b9b57f32531b3d61c917b9eec19a4ba73336011041e16a0022c5e62b2c768b34a0bdc08ffd75bbaa0338719577001496c9de8a5638420b0a229
-
Filesize
776KB
MD5444a2327626c664b4420db374c75e288
SHA188932a99bf34448a6b8ec23de1820c8aaff210e5
SHA256e6ce4f21eddbc3ee5644d38c6cbdb0b2cb915ad6b1b4689598d636d1bfdd705b
SHA512e9fd6171d0fb282c323cfbe7684c9b81231f45ef33e2aa657a6fb3749d0d50a3cedcafee51b53fa8e567d7aa5090dae39339648d47c9893ad258b12e54ba295a