Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe
-
Size
131KB
-
MD5
35b13c91b3fd4240715ca17a1704f7c6
-
SHA1
936b20aa0f5acda2fef3d523060ee8b63a737336
-
SHA256
933313715594f05fb1ab3ff7631ec284ee797ae2f7e2fa17100bfdffd0095dff
-
SHA512
76b9f846da5097499302c82956e2a29fcf1f4d453b5bff12cddcf56600ce54490218ba9a43d7861c253680c138fb5c7201af5bc90945b53b593471bcda26b57c
-
SSDEEP
3072:iNEeUBe0fMZNydHLTGvtHYkdrp3DyZBKsb/:iNEeUBe8qNIGJVsBK6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 Ftutoa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\DFGQBFFUUO = "C:\\Windows\\Ftutoa.exe" Ftutoa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe File created C:\Windows\Ftutoa.exe 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe File opened for modification C:\Windows\Ftutoa.exe 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main Ftutoa.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International Ftutoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe 2148 Ftutoa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2148 2564 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2148 2564 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2148 2564 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe 29 PID 2564 wrote to memory of 2148 2564 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\Ftutoa.exeC:\Windows\Ftutoa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
131KB
MD535b13c91b3fd4240715ca17a1704f7c6
SHA1936b20aa0f5acda2fef3d523060ee8b63a737336
SHA256933313715594f05fb1ab3ff7631ec284ee797ae2f7e2fa17100bfdffd0095dff
SHA51276b9f846da5097499302c82956e2a29fcf1f4d453b5bff12cddcf56600ce54490218ba9a43d7861c253680c138fb5c7201af5bc90945b53b593471bcda26b57c
-
Filesize
372B
MD5bdeaace77ab495d6465da27ed4bbd784
SHA10aa8daf11ab244dfbc69dfb2a47830e27dae1a75
SHA256390535e7fe5bfb4dc4bbfebc6788a192013a761352b3ddceaafddb19571d9c07
SHA512b17639201046a068dfab65a2e36551d40bc5a253d678f795767fdd536783a08c0c2b879161ab04c325e5e541f784f8e67efbb5b165b568fce88dc84e1c44d2dc