Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe
-
Size
295KB
-
MD5
2a171268b910b9efe97d7663487603b8
-
SHA1
d55f941f0a6e9d9354c8a0f44427428c9ba7a932
-
SHA256
991c02642077dbf3179f88a0364f68de9f7e5e3704dde3dec87238d779c6eaa0
-
SHA512
ca4b602acede37ee5ad50e3cbfacab9a5e14f0d393b3b0060d169a6e36dd182e8e515b0ceda6d791cb0eb0f330849bc935ff517c105df53fc3c279844cd349c7
-
SSDEEP
6144:S2gon3w1WG6wPTqbhJTtNSDpxDPcfp3U8p:SWnAwC2FJ5NTp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2828 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 2736 cmd.exe 2736 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\1234 = "12345.exe" 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\1234 = "12345.exe" 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\update\2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe cmd.exe File opened for modification C:\Program Files (x86)\update\2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe cmd.exe File created C:\Program Files (x86)\update\cfg 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2952 PING.EXE 2916 PING.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2896 2808 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2896 2808 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2896 2808 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2896 2808 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2736 2808 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2736 2808 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2736 2808 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2736 2808 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 32 PID 2736 wrote to memory of 2952 2736 cmd.exe 35 PID 2736 wrote to memory of 2952 2736 cmd.exe 35 PID 2736 wrote to memory of 2952 2736 cmd.exe 35 PID 2736 wrote to memory of 2952 2736 cmd.exe 35 PID 2736 wrote to memory of 2828 2736 cmd.exe 36 PID 2736 wrote to memory of 2828 2736 cmd.exe 36 PID 2736 wrote to memory of 2828 2736 cmd.exe 36 PID 2736 wrote to memory of 2828 2736 cmd.exe 36 PID 2828 wrote to memory of 2588 2828 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 39 PID 2828 wrote to memory of 2588 2828 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 39 PID 2828 wrote to memory of 2588 2828 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 39 PID 2828 wrote to memory of 2588 2828 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe 39 PID 2588 wrote to memory of 2916 2588 cmd.exe 41 PID 2588 wrote to memory of 2916 2588 cmd.exe 41 PID 2588 wrote to memory of 2916 2588 cmd.exe 41 PID 2588 wrote to memory of 2916 2588 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C copy "2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe" "C:\Program Files (x86)\update\2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe"2⤵
- Drops file in Program Files directory
PID:2896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C @echo off && ping -n 5 127.0.0.1 && start 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.13⤵
- Runs ping.exe
PID:2952
-
-
C:\Program Files (x86)\update\2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C @echo off && ping -n 15 127.0.0.1 && del 2a171268b910b9efe97d7663487603b8_JaffaCakes118.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\PING.EXEping -n 15 127.0.0.15⤵
- Runs ping.exe
PID:2916
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD52a171268b910b9efe97d7663487603b8
SHA1d55f941f0a6e9d9354c8a0f44427428c9ba7a932
SHA256991c02642077dbf3179f88a0364f68de9f7e5e3704dde3dec87238d779c6eaa0
SHA512ca4b602acede37ee5ad50e3cbfacab9a5e14f0d393b3b0060d169a6e36dd182e8e515b0ceda6d791cb0eb0f330849bc935ff517c105df53fc3c279844cd349c7