Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe
-
Size
385KB
-
MD5
2ed1c54e861545797b5c8e3d9d9199e0
-
SHA1
f5a7a0390c613636324ba78f00b6fdd12e8c4d9a
-
SHA256
8f477e403616e74e8cc7b216be6aa31d7c8b3fc52a68ee4775220760172d2c99
-
SHA512
4a07d6ecc0d6b087ec1ad7610a9be2e59412677a2e085f9f307cc473b8fcd1d9a5625447c290010a2cdba3b14c937f7883cb6d233b5bb141cf26bac9e4b5d138
-
SSDEEP
6144:m/8xmxLy7OvxilGHUmlXExMXW/DJSw4LlKg90H65Q6UZo7M+Pe:mExmJ7kvmhExcODJSzLk7a5QTL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1708 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 byxu.exe -
Loads dropped DLL 1 IoCs
pid Process 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\{278F5008-6814-AD4F-E8EF-460FE6556512} = "C:\\Users\\Admin\\AppData\\Roaming\\Yzqu\\byxu.exe" byxu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe 2756 byxu.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 2756 byxu.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2756 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 30 PID 2252 wrote to memory of 2756 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 30 PID 2252 wrote to memory of 2756 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 30 PID 2252 wrote to memory of 2756 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 30 PID 2756 wrote to memory of 1108 2756 byxu.exe 19 PID 2756 wrote to memory of 1108 2756 byxu.exe 19 PID 2756 wrote to memory of 1108 2756 byxu.exe 19 PID 2756 wrote to memory of 1108 2756 byxu.exe 19 PID 2756 wrote to memory of 1108 2756 byxu.exe 19 PID 2756 wrote to memory of 1168 2756 byxu.exe 20 PID 2756 wrote to memory of 1168 2756 byxu.exe 20 PID 2756 wrote to memory of 1168 2756 byxu.exe 20 PID 2756 wrote to memory of 1168 2756 byxu.exe 20 PID 2756 wrote to memory of 1168 2756 byxu.exe 20 PID 2756 wrote to memory of 1204 2756 byxu.exe 21 PID 2756 wrote to memory of 1204 2756 byxu.exe 21 PID 2756 wrote to memory of 1204 2756 byxu.exe 21 PID 2756 wrote to memory of 1204 2756 byxu.exe 21 PID 2756 wrote to memory of 1204 2756 byxu.exe 21 PID 2756 wrote to memory of 1488 2756 byxu.exe 25 PID 2756 wrote to memory of 1488 2756 byxu.exe 25 PID 2756 wrote to memory of 1488 2756 byxu.exe 25 PID 2756 wrote to memory of 1488 2756 byxu.exe 25 PID 2756 wrote to memory of 1488 2756 byxu.exe 25 PID 2756 wrote to memory of 2252 2756 byxu.exe 29 PID 2756 wrote to memory of 2252 2756 byxu.exe 29 PID 2756 wrote to memory of 2252 2756 byxu.exe 29 PID 2756 wrote to memory of 2252 2756 byxu.exe 29 PID 2756 wrote to memory of 2252 2756 byxu.exe 29 PID 2252 wrote to memory of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31 PID 2252 wrote to memory of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31 PID 2252 wrote to memory of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31 PID 2252 wrote to memory of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31 PID 2252 wrote to memory of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31 PID 2252 wrote to memory of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31 PID 2252 wrote to memory of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31 PID 2252 wrote to memory of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31 PID 2252 wrote to memory of 1708 2252 2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ed1c54e861545797b5c8e3d9d9199e0_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\Yzqu\byxu.exe"C:\Users\Admin\AppData\Roaming\Yzqu\byxu.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa1dc5832.bat"3⤵
- Deletes itself
PID:1708
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD54f555d4fb5512578fad892d32aff6534
SHA150c04ac53f5bc67c221dfba40cfebb9189c14b9e
SHA256d5a408abed3612d12e243c8eedafad10030c9d0710b36dd767d7fc385b9105ce
SHA5122febb1d810da17045afcde1dfd43505c11f0fdc9d5c0b803da53e10dea03ea2bb70acb116148a8561b68431a9184c640e36c091b93819bfb750dbba35e0b9253
-
Filesize
385KB
MD5bca44b3337bd32207ef9f5f15d028695
SHA12ae1bfc5abd79b7207245300881f7ec940024990
SHA25619041d586ad2d386d171f45d0c328391b7a14d05ba49c68cc4e4b8e9a499cc02
SHA51266274bd375565bf1dcf8011515439fd41906ca4337ba48508f56ad8be8b4ce705f2b7a054603acbb91f81425abc22c99fd5823056079b51a6c2203e44a63d551