Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe
-
Size
191KB
-
MD5
3d560e3271c9b7e8e5404154d4d2cb1e
-
SHA1
75de2faacb6ee1e804b3a8ea50f2f3cb1333a12c
-
SHA256
b72368289f87a14f0a0dd8f8ba98cf42be5d1db97ef782f3761a5230e08e2627
-
SHA512
965ea34d28fc55d771d52ff27c12fc0d90ab156c687e3778f190eb066663737054e83612092039568204f2fea7b3b0db245f8838b44473900b7758f5ededbbd8
-
SSDEEP
3072:deQAZDNDRYtU4knKuVjXynbSckD0IMOGkHl+ESkV3dpD/6X0:de/ZDNOkAOsIhgjkRTiX0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1972 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1072 awte.exe -
Loads dropped DLL 2 IoCs
pid Process 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\{646C8E9F-4F10-F843-C9F9-80E36C099916} = "C:\\Users\\Admin\\AppData\\Roaming\\Soib\\awte.exe" awte.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2368 set thread context of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe 1072 awte.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1072 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1072 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1072 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 30 PID 2368 wrote to memory of 1072 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 30 PID 1072 wrote to memory of 1108 1072 awte.exe 19 PID 1072 wrote to memory of 1108 1072 awte.exe 19 PID 1072 wrote to memory of 1108 1072 awte.exe 19 PID 1072 wrote to memory of 1108 1072 awte.exe 19 PID 1072 wrote to memory of 1108 1072 awte.exe 19 PID 1072 wrote to memory of 1164 1072 awte.exe 20 PID 1072 wrote to memory of 1164 1072 awte.exe 20 PID 1072 wrote to memory of 1164 1072 awte.exe 20 PID 1072 wrote to memory of 1164 1072 awte.exe 20 PID 1072 wrote to memory of 1164 1072 awte.exe 20 PID 1072 wrote to memory of 1220 1072 awte.exe 21 PID 1072 wrote to memory of 1220 1072 awte.exe 21 PID 1072 wrote to memory of 1220 1072 awte.exe 21 PID 1072 wrote to memory of 1220 1072 awte.exe 21 PID 1072 wrote to memory of 1220 1072 awte.exe 21 PID 1072 wrote to memory of 1396 1072 awte.exe 25 PID 1072 wrote to memory of 1396 1072 awte.exe 25 PID 1072 wrote to memory of 1396 1072 awte.exe 25 PID 1072 wrote to memory of 1396 1072 awte.exe 25 PID 1072 wrote to memory of 1396 1072 awte.exe 25 PID 1072 wrote to memory of 2368 1072 awte.exe 29 PID 1072 wrote to memory of 2368 1072 awte.exe 29 PID 1072 wrote to memory of 2368 1072 awte.exe 29 PID 1072 wrote to memory of 2368 1072 awte.exe 29 PID 1072 wrote to memory of 2368 1072 awte.exe 29 PID 2368 wrote to memory of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31 PID 2368 wrote to memory of 1972 2368 3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3d560e3271c9b7e8e5404154d4d2cb1e_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\Soib\awte.exe"C:\Users\Admin\AppData\Roaming\Soib\awte.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8c6f4c74.bat"3⤵
- Deletes itself
PID:1972
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5c7f5d08995539191a1be0b5ba18f7b12
SHA12630cad8594cbdaecc1784898d75792bfcf0f6e2
SHA2560a4a835beb29845d6fbff00f8e986dc206de4f9ef1d868ee47d3ce473e586d46
SHA51273691f5febb1ce60c3fbe87af47af40795f8c738bd59875a40b3cb26b43671f688bd3d8063f1528739861fe2d95c12e061296a383de80e19ed90bfa753ad8e27
-
Filesize
191KB
MD51e14d65dc43b685033a50108891aa43c
SHA1b2c51a6329efd340025d655600ee40158c74b25c
SHA25667f1f2801f33d46addb3091c850c3a6e86c795c41ec13ae5d1ea2afe1a17b577
SHA51297760d59df3cc0b98c87cbe828bf2c61d8d6099b3ede938f19da672e18ba13dbada135a0fa10bf6a92e91f8246b8d870181de98db57a5ddf32ccc01a56ce19c6