Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 13:11
Behavioral task
behavioral1
Sample
3940ec561ee9f25288b59d8ef31f8a2c_JaffaCakes118.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
3940ec561ee9f25288b59d8ef31f8a2c_JaffaCakes118.exe
-
Size
940KB
-
MD5
3940ec561ee9f25288b59d8ef31f8a2c
-
SHA1
35da11fb910b2c0317cb947e99b0f6893f4b0f0b
-
SHA256
524d99b4e16d5c563bde2611e69a214d5fdee5761181e68cd482dd004a3f6e02
-
SHA512
9b7274c438531e4b52c06c64f703b87207668b05e63d0bff1d74814fcd96f00839f6c4c5c033d45b2967189ea4c3de69f7a1a5a76a9ff9e863bcaf2e61067101
-
SSDEEP
12288:OKVVRYin4+EvfXS2u15Vq/CRbKQt7Ibc1TsrfTTWz5UwN7lABKXmfFj2DOJ7rYXz:O8nhOi2i5Vq/CRxc4SrfHWqnN78Xf3
Score
7/10
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Wine 3940ec561ee9f25288b59d8ef31f8a2c_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2688-0-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-2-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-3-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-4-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-5-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-6-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-7-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-8-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-9-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-10-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-11-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-12-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-13-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-14-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-15-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-16-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-17-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-18-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-19-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-20-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-21-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-22-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-23-0x0000000000400000-0x0000000000619000-memory.dmp themida behavioral1/memory/2688-24-0x0000000000400000-0x0000000000619000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3940ec561ee9f25288b59d8ef31f8a2c_JaffaCakes118.exe" 3940ec561ee9f25288b59d8ef31f8a2c_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2688 3940ec561ee9f25288b59d8ef31f8a2c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2688 3940ec561ee9f25288b59d8ef31f8a2c_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3940ec561ee9f25288b59d8ef31f8a2c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3940ec561ee9f25288b59d8ef31f8a2c_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2688