Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe
-
Size
190KB
-
MD5
3b68985626cab622f8b6e7c64992da15
-
SHA1
088c23e7452254185bc1d68bc8938dafb74d2e6f
-
SHA256
18f25368f92e615e37bcbf6b9dd746e78c284fa43e54785f0d1a424ff216584a
-
SHA512
ea5fc7800890882b9f92e49ed80027a8d23560bdba21ecf7428daff3bd7d4ee559c9acb957c0645dc5b7fed96de63b4f846e5f843422ccaca170b95aab0274d9
-
SSDEEP
3072:ehp6MQRMEJMxrYZCX2lx775d5NSpu6s2Wcy4rYnXZpMGPa4eRskmKgKWlPIE:ehpmFMdPX2lx77efs2WcyHnXZfax+KA
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2376-1-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2376-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2272-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2272-8-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2376-68-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2544-71-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2544-70-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2544-73-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2376-129-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2376-171-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2272 2376 3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2272 2376 3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2272 2376 3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2272 2376 3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe 30 PID 2376 wrote to memory of 2544 2376 3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe 32 PID 2376 wrote to memory of 2544 2376 3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe 32 PID 2376 wrote to memory of 2544 2376 3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe 32 PID 2376 wrote to memory of 2544 2376 3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5023672eb08b046d9473163d55923f26c
SHA1960fd49533af48cfed23f8d880c2fc31545bf28a
SHA256491b537cc528837ebec2861728bff9b31f3ab7efbd1e0f6426abb7bd906c0083
SHA51229eed29de125b15c9f015d20d3122438c2f0a8c2dec68e266e444414f84c3cb36a367ba8e3ca17e433effb26529cda8cd0301361d788da67cf3ed62dcb287383
-
Filesize
1KB
MD5018d6f6338731c28f82f34b024c38703
SHA1ec8a74c1d2339bf850ec092cd3bd3a5fde8501ad
SHA256cdc80de755ba0c13e6662d99636f44da517d01e7b9179a961fb2e62a54ab330a
SHA51242cbe7550e901e90fd168d0c3d27bb34ebbe077ea5e1be4d6a5a48a1d762aa52a154231ba761ae36d8e74c5baf760b2e0c9f29f9e0c942ad933500d91882053f
-
Filesize
996B
MD52fa6e3a699269323d47575d42b6990da
SHA115752e41892d08b6e35a5c10e89ef57a96e02419
SHA2565dd347db725a8a870b1db52b2b3cdd26917350dfd921d66d0bbb89da308bc7ec
SHA512cf3bff19ac203a5c05399024c951c95f84d15732b3c3d1ab87cb3a04bcddd8bae9d389e81f2e88926ab57f40f7c0d48d62d595e67d73e21c1522c7d8cbef71fa