Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 15:22
Behavioral task
behavioral1
Sample
39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe
-
Size
10KB
-
MD5
39adeeb9cafc842f39edb8a562662bff
-
SHA1
0474b218e6946bfa819d5c15e69514c783878d30
-
SHA256
5a72277b283a11a486508fffc99360cad235ed872f500e29ae74b2048882a810
-
SHA512
4d7bc00a050bb0d49022793ad74909bb19d2609fab7fccb520d2656c062cf16dfca0beb918a52c046a99b88e8b788167ebfae05facb472ee8e947ebc754ebfc6
-
SSDEEP
192:5tfFhhC1u+Sxo8CMjzBPYttH0ubAvo6rnWhQE5ezps:bfbM1czQHz8vo6zWL5ezps
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1924 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1924-1-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\ztavpw0.dll 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ztavpw0.dll 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CEB1B6B3-4E5F-A1D6-348D-E7B3952579D6} 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CEB1B6B3-4E5F-A1D6-348D-E7B3952579D6}\ExeModuleName = "C:\\Users\\Admin\\AppData\\Local\\Temp\\39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe" 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CEB1B6B3-4E5F-A1D6-348D-E7B3952579D6}\DllModuleName = "C:\\Windows\\SysWow64\\ztavpw0.dll" 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CEB1B6B3-4E5F-A1D6-348D-E7B3952579D6}\SobjEventName = "CZXSDERDAKSIIZT_0" 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1924 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe 1924 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe 1924 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1924 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1148 1924 39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\39adeeb9cafc842f39edb8a562662bff_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5a503ef360f865c5ccb866ce12d32e967
SHA122df08f462d3f6ebee966fee741aa307d8141a3c
SHA256db1892468a2beb1c6f5fc66638ce601f231f190d06492049855c5c408a9fde8e
SHA5125ac7b237d1d949dc0609d5dc3edcb78ffc4ed662e97b37672234597947ac3cab55aefa5c5434eadcc1f1e1b94d859991dec92e6604efaed69d587d6a43764297