Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
36840e112c43671900001245f2101373_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36840e112c43671900001245f2101373_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36840e112c43671900001245f2101373_JaffaCakes118.exe
-
Size
93KB
-
MD5
36840e112c43671900001245f2101373
-
SHA1
50f679730e074be68bc1afb5b512003baa0d1809
-
SHA256
a4a5d06f7c8ad51838f3eacee5ab8c656654a5cbb7268e053a351c0b9f40dde6
-
SHA512
6b7aa666a232ae2fd2e5a0ca9be4a0156eeb42135c327e505a34449b428f3121e70a32f0dc251b0c058a531590fef9c0a4e5507a2e1cdba729790a515c51755e
-
SSDEEP
1536:5wH8PDwlr3QF/GTqg8HLhobQLAfm5b8HLljs2mwEhstzWrYy:A4Mlr39Og8HlKQLAfMmLljJmwEixWrZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 268 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2688 ebpe.exe -
Loads dropped DLL 2 IoCs
pid Process 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\{56A52C12-F56B-A58F-B7D3-F48AC788E0F7} = "C:\\Users\\Admin\\AppData\\Roaming\\Azga\\ebpe.exe" ebpe.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2640 set thread context of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy 36840e112c43671900001245f2101373_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 36840e112c43671900001245f2101373_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe 2688 ebpe.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe Token: SeSecurityPrivilege 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe Token: SeSecurityPrivilege 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2688 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 30 PID 2640 wrote to memory of 2688 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 30 PID 2640 wrote to memory of 2688 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 30 PID 2640 wrote to memory of 2688 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 30 PID 2688 wrote to memory of 1120 2688 ebpe.exe 19 PID 2688 wrote to memory of 1120 2688 ebpe.exe 19 PID 2688 wrote to memory of 1120 2688 ebpe.exe 19 PID 2688 wrote to memory of 1120 2688 ebpe.exe 19 PID 2688 wrote to memory of 1120 2688 ebpe.exe 19 PID 2688 wrote to memory of 1180 2688 ebpe.exe 20 PID 2688 wrote to memory of 1180 2688 ebpe.exe 20 PID 2688 wrote to memory of 1180 2688 ebpe.exe 20 PID 2688 wrote to memory of 1180 2688 ebpe.exe 20 PID 2688 wrote to memory of 1180 2688 ebpe.exe 20 PID 2688 wrote to memory of 1208 2688 ebpe.exe 21 PID 2688 wrote to memory of 1208 2688 ebpe.exe 21 PID 2688 wrote to memory of 1208 2688 ebpe.exe 21 PID 2688 wrote to memory of 1208 2688 ebpe.exe 21 PID 2688 wrote to memory of 1208 2688 ebpe.exe 21 PID 2688 wrote to memory of 1288 2688 ebpe.exe 23 PID 2688 wrote to memory of 1288 2688 ebpe.exe 23 PID 2688 wrote to memory of 1288 2688 ebpe.exe 23 PID 2688 wrote to memory of 1288 2688 ebpe.exe 23 PID 2688 wrote to memory of 1288 2688 ebpe.exe 23 PID 2688 wrote to memory of 2640 2688 ebpe.exe 29 PID 2688 wrote to memory of 2640 2688 ebpe.exe 29 PID 2688 wrote to memory of 2640 2688 ebpe.exe 29 PID 2688 wrote to memory of 2640 2688 ebpe.exe 29 PID 2688 wrote to memory of 2640 2688 ebpe.exe 29 PID 2640 wrote to memory of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 PID 2640 wrote to memory of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 PID 2640 wrote to memory of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 PID 2640 wrote to memory of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 PID 2640 wrote to memory of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 PID 2640 wrote to memory of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 PID 2640 wrote to memory of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 PID 2640 wrote to memory of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 PID 2640 wrote to memory of 268 2640 36840e112c43671900001245f2101373_JaffaCakes118.exe 31 PID 2688 wrote to memory of 1164 2688 ebpe.exe 33 PID 2688 wrote to memory of 1164 2688 ebpe.exe 33 PID 2688 wrote to memory of 1164 2688 ebpe.exe 33 PID 2688 wrote to memory of 1164 2688 ebpe.exe 33 PID 2688 wrote to memory of 1164 2688 ebpe.exe 33 PID 2688 wrote to memory of 1148 2688 ebpe.exe 34 PID 2688 wrote to memory of 1148 2688 ebpe.exe 34 PID 2688 wrote to memory of 1148 2688 ebpe.exe 34 PID 2688 wrote to memory of 1148 2688 ebpe.exe 34 PID 2688 wrote to memory of 1148 2688 ebpe.exe 34 PID 2688 wrote to memory of 1020 2688 ebpe.exe 35 PID 2688 wrote to memory of 1020 2688 ebpe.exe 35 PID 2688 wrote to memory of 1020 2688 ebpe.exe 35 PID 2688 wrote to memory of 1020 2688 ebpe.exe 35 PID 2688 wrote to memory of 1020 2688 ebpe.exe 35 PID 2688 wrote to memory of 1944 2688 ebpe.exe 36 PID 2688 wrote to memory of 1944 2688 ebpe.exe 36 PID 2688 wrote to memory of 1944 2688 ebpe.exe 36 PID 2688 wrote to memory of 1944 2688 ebpe.exe 36 PID 2688 wrote to memory of 1944 2688 ebpe.exe 36
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\36840e112c43671900001245f2101373_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\36840e112c43671900001245f2101373_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\Azga\ebpe.exe"C:\Users\Admin\AppData\Roaming\Azga\ebpe.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp304b4e6e.bat"3⤵
- Deletes itself
PID:268
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1288
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1164
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1148
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1020
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD597f2f9f8278bd4a294093713dd08c80a
SHA1973b5d8a23768f8384b36303be9bee1afb7fc737
SHA2561a581185f018f780b41bf9718d20197f0719de8b1c21911868d0ef7baf3a519e
SHA5123fe42b82008ad323b64e1de3082dea601f9bde4887039fa718300520cf8e8bf918f1779b5198094491a38eef6161d6a0156470b775d94c480a45bd2995282a5d
-
Filesize
380B
MD5687e10f7c350712f188f92dbd62c80dd
SHA1d1815e25373dbc39b0d8a64f0bb4119cc97cae68
SHA25696880eaab26e8748d37edacfb4c8c1d70f405b9613a69aa9cb4aa9dce739459b
SHA512addea6110b4ecef679d4b1bf9e9c4253f7291c0398ad52314f9d97719459a1a80e576ca1fa41bac5770be7fc2dd3da468462e5ccf70d9acdfe593c523111f212
-
Filesize
93KB
MD5a08d2b58c66694f25fac4638e447e89d
SHA1d654bb3a7c7275687ea44b09fbd5836f24b4fc97
SHA25687e1f7d7b2a768dec15f1a84ffe7cec629209d50c64f4f97c6bf29c66980bc87
SHA512979c0bb3ad99cb780c3fab28c157606c7893fd961fb76f9dc14a8a876b1a3a265e4077d453e159d59a4c36e1fb56c6f11352853863d8c2aa300790175f5408d8