Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe
-
Size
46KB
-
MD5
346bb77b4da9f9e1b476ac9571995a90
-
SHA1
2fe1f7ed594c9bccf8bd273038785f28b68c35f6
-
SHA256
fd42eb598834c451e1af67f39b32b31fab411b2d881f21710b3e666cd7ee1500
-
SHA512
4b6f77d7d0a2659c30db2a208ca61143bf25c9c699ff0f6ab27ced27cec280db32147b99cedb5179e568cc168efbd1697e09800ffda7b72bde182926ca51cd50
-
SSDEEP
768:Vvfdzb0EN0rwc5trkAuE8iMnXYV4ook02AHNC08C6LRqkijEzExEWyB9iz3zJXRC:9dzbSAAuE8Z3ook0HCVnRqkiKExHyHiy
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 400 lyosbwbl.exe 2668 mzq2qki.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MzQ2QkI3N0I0REE5RjlFMU = "C:\\ProgramData\\lyosbwbl.exe" lyosbwbl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 lyosbwbl.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier lyosbwbl.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mzq2qki.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mzq2qki.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe 2668 mzq2qki.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2248 346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe Token: SeDebugPrivilege 400 lyosbwbl.exe Token: SeDebugPrivilege 2668 mzq2qki.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2248 wrote to memory of 400 2248 346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe 28 PID 2248 wrote to memory of 400 2248 346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe 28 PID 2248 wrote to memory of 400 2248 346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe 28 PID 400 wrote to memory of 2668 400 lyosbwbl.exe 31 PID 400 wrote to memory of 2668 400 lyosbwbl.exe 31 PID 400 wrote to memory of 2668 400 lyosbwbl.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\346bb77b4da9f9e1b476ac9571995a90_JaffaCakes118.exe"1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\ProgramData\lyosbwbl.exe"C:\ProgramData\lyosbwbl.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\mzq2qki.exe"C:\Users\Admin\mzq2qki.exe" C:\ProgramData\lyosbwbl.exe 4003⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5346bb77b4da9f9e1b476ac9571995a90
SHA12fe1f7ed594c9bccf8bd273038785f28b68c35f6
SHA256fd42eb598834c451e1af67f39b32b31fab411b2d881f21710b3e666cd7ee1500
SHA5124b6f77d7d0a2659c30db2a208ca61143bf25c9c699ff0f6ab27ced27cec280db32147b99cedb5179e568cc168efbd1697e09800ffda7b72bde182926ca51cd50