Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
4388df2fc2175b61291872d250636c7d
-
SHA1
2785816a119b8e7ac72ecd9b07ba1ac50729c140
-
SHA256
e89bf48b850461d265b7334a711e40bffd3cf4e03fa6a077bdd4cb3317c40e82
-
SHA512
98c68643c408bc2910fbfefaee697278d8b67db8c0f5a10873143cc6535ce02b05b2a298e5a77fc6a228e7945ca5a1d9e23d9aa1a68e2b87b7076228520475ed
-
SSDEEP
49152:DOw0Q7JUd4vKVmENPNlgz/YQKB+wMt+SOl3qcYllMBhlHz2rE0cOZ44KjQiejD6/:DOw0Q7JMQKVphNlg0QKct+SOl6cYvMzl
Malware Config
Signatures
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0006000000018f7c-36.dat family_ardamax -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Executes dropped EXE 2 IoCs
pid Process 2196 explorer.exe 2892 FQO.exe -
Loads dropped DLL 3 IoCs
pid Process 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 2196 explorer.exe 2892 FQO.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FQO Start = "C:\\Windows\\SysWOW64\\JHPMIJ\\FQO.exe" FQO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\JHPMIJ\AKV.exe explorer.exe File created C:\Windows\SysWOW64\JHPMIJ\FQO.exe explorer.exe File opened for modification C:\Windows\SysWOW64\JHPMIJ\ FQO.exe File created C:\Windows\SysWOW64\JHPMIJ\FQO.004 explorer.exe File created C:\Windows\SysWOW64\JHPMIJ\FQO.001 explorer.exe File created C:\Windows\SysWOW64\JHPMIJ\FQO.002 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2488 set thread context of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\explorer.exe 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\explorer.exe 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2892 FQO.exe Token: SeIncBasePriorityPrivilege 2892 FQO.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2892 FQO.exe 2892 FQO.exe 2892 FQO.exe 2892 FQO.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2488 wrote to memory of 2196 2488 4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe 29 PID 2196 wrote to memory of 2892 2196 explorer.exe 30 PID 2196 wrote to memory of 2892 2196 explorer.exe 30 PID 2196 wrote to memory of 2892 2196 explorer.exe 30 PID 2196 wrote to memory of 2892 2196 explorer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4388df2fc2175b61291872d250636c7d_JaffaCakes118.exe"1⤵
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\explorer.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\explorer.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\JHPMIJ\FQO.exe"C:\Windows\system32\JHPMIJ\FQO.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD551507d91d43683b9c4b8fafeb4d888f8
SHA1ead2f68338da7af4720378cd46133589fc9405ba
SHA25671b3aecefd36e4855a369019ac5871c544d39f8889d23cd455466a24cdecce6b
SHA512a5a7ff3f8ffb72719b7e2c9dc2719c99ea32bd68994918ea027c0d7d54cfe0c80bfd34486dd8d3cdd390376bc4c8d1f7d97de4b98b7d39a3e10c3e2682c07d1c
-
Filesize
43KB
MD593df156c4bd9d7341f4c4a4847616a69
SHA1c7663b32c3c8e247bc16b51aff87b45484652dc1
SHA256e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e
SHA512ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35
-
Filesize
1KB
MD5c419eadafd70c55f88b6235ccf3d14a0
SHA1e04856391e275bfe54fdc6dfabdfe798f80d2afb
SHA25676f3de81ac5a57b368786feffd51e82c49527298bd6ed554ae2cdac118043968
SHA5124b3e1e8d94f7e8bd9a32758fab27b2fed6299882a092fea578e1107655e9d5a7d9480eca2c205b3a85e897a1ae3ffd92587b7c4b9ccd3722bb84bfb45a30f683
-
Filesize
1.7MB
MD53cd29c0df98a7aeb69a9692843ca3edb
SHA17c86aea093f1979d18901bd1b89a2b02a60ac3e2
SHA2565a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32
SHA512e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
61KB
MD5383d5f5d4240d590e7dec3f7312a4ac7
SHA1f6bcade8d37afb80cf52a89b3e84683f4643fbce
SHA2567e87f6817b17a75106d34ce9884c40ddfb381bf8f2013930916498d1df0a6422
SHA512e652c41ec95d653940b869426bc2cbd8e5b3159110ffaab7d623e23eebe1f34ca65be6a9a9cdcd5f41aec7567469d6b4d6362d24ae92267cddb8940e1265806a