Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe
-
Size
156KB
-
MD5
2c5ed753bc7abd804fdcd0fe566fc63e
-
SHA1
f528d776346aa13aff3c97af26d947b59fc298a1
-
SHA256
0febe34bb293f6de2edf440d29976f9c546aecb02eb0b3ee78c5c4473fabf097
-
SHA512
67a43d0616aae25b5b5e4b672f261828c6fb6bc6d62a09bbed29adf212f116d48c26d26f4a034e145da3960c5a922fd3c8664da5336f9c2b227a6755942c6b8c
-
SSDEEP
3072:s49BY5KsA1yUg1+If5clnat6ZRSXFy8bw6Jm+lweut6OAq:HYi15g5qXZRSVRjJtJu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2464 newdnswatch.exe 2096 OEQA3ED.exe -
Loads dropped DLL 4 IoCs
pid Process 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe 2464 newdnswatch.exe 2464 newdnswatch.exe -
resource yara_rule behavioral1/memory/3008-1-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/3008-7-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2464-18-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2464-15-0x0000000000400000-0x0000000000474000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\5Z3U4G4I5X6G3F7JXBZOJQSGFEOCE = "C:\\newdnswatch\\newdnswatch.exe /q" OEQA3ED.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" OEQA3ED.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PhishingFilter OEQA3ED.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" OEQA3ED.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" OEQA3ED.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery OEQA3ED.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe 2464 newdnswatch.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe 2096 OEQA3ED.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe Token: SeDebugPrivilege 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe Token: SeDebugPrivilege 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe Token: SeDebugPrivilege 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe Token: SeDebugPrivilege 2464 newdnswatch.exe Token: SeDebugPrivilege 2464 newdnswatch.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe Token: SeDebugPrivilege 2096 OEQA3ED.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2464 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe 29 PID 3008 wrote to memory of 2464 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe 29 PID 3008 wrote to memory of 2464 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe 29 PID 3008 wrote to memory of 2464 3008 2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe 29 PID 2464 wrote to memory of 2096 2464 newdnswatch.exe 30 PID 2464 wrote to memory of 2096 2464 newdnswatch.exe 30 PID 2464 wrote to memory of 2096 2464 newdnswatch.exe 30 PID 2464 wrote to memory of 2096 2464 newdnswatch.exe 30 PID 2464 wrote to memory of 2096 2464 newdnswatch.exe 30 PID 2464 wrote to memory of 2096 2464 newdnswatch.exe 30 PID 2096 wrote to memory of 3008 2096 OEQA3ED.exe 28 PID 2096 wrote to memory of 3008 2096 OEQA3ED.exe 28 PID 2096 wrote to memory of 3008 2096 OEQA3ED.exe 28 PID 2096 wrote to memory of 3008 2096 OEQA3ED.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2c5ed753bc7abd804fdcd0fe566fc63e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\newdnswatch\newdnswatch.exe"C:\newdnswatch\newdnswatch.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\OEQA3ED.exe"C:\Users\Admin\AppData\Local\Temp\OEQA3ED.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
5KB
MD518d78cd1e86738782976b14e8d5f51ec
SHA1d03a8bfdfc1c043c1d552ff59027e210b60d4781
SHA256a3ae2f988f8764f47292d5281a6f6890e22bf4c00bfb6200b54ecbf5b33995c6
SHA512a2a05813d76b092b20dba300e7b7a257cc414c43549a6527caf18a061ee658163bc5829e4a1fc9914a5eaef46d40cc6ce96cc69c86b9de3b9adf7fc38122ea7c
-
Filesize
156KB
MD52c5ed753bc7abd804fdcd0fe566fc63e
SHA1f528d776346aa13aff3c97af26d947b59fc298a1
SHA2560febe34bb293f6de2edf440d29976f9c546aecb02eb0b3ee78c5c4473fabf097
SHA51267a43d0616aae25b5b5e4b672f261828c6fb6bc6d62a09bbed29adf212f116d48c26d26f4a034e145da3960c5a922fd3c8664da5336f9c2b227a6755942c6b8c