Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe
-
Size
253KB
-
MD5
4129fd88eb45ee0d870c96220f32d357
-
SHA1
575a6b036ac03ecf0934a64d79a57665f9cf184b
-
SHA256
8e414e83ad6b3f99bef714a2a023fd244a812bc990bc79d702534442c35050c2
-
SHA512
3f1c4c3d6c5f814b50f8ebb1f99d6c8b21fe660ad15ff7c00e8d520624b5bc05dd3a8896436e32ae013a1a0da4f6d98d4ec09277c9f182370e2c6ee46b599820
-
SSDEEP
6144:g/0uopAiF7tWm9d9qdH1lexDodpCGR4srdgUScDH:gJpQzqhexDod7R4XU
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2876 1.exe 2728 1.exe 2616 setup.exe -
Loads dropped DLL 7 IoCs
pid Process 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 2876 1.exe 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 2616 setup.exe 2616 setup.exe 2616 setup.exe -
resource yara_rule behavioral1/files/0x00070000000186f7-26.dat upx behavioral1/memory/2808-31-0x0000000002450000-0x0000000003168000-memory.dmp upx behavioral1/memory/2616-36-0x0000000000400000-0x0000000001118000-memory.dmp upx behavioral1/memory/2616-44-0x0000000000400000-0x0000000001118000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2876 set thread context of 2728 2876 1.exe 31 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2728 1.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2876 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2876 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2876 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 30 PID 2808 wrote to memory of 2876 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2728 2876 1.exe 31 PID 2876 wrote to memory of 2728 2876 1.exe 31 PID 2876 wrote to memory of 2728 2876 1.exe 31 PID 2876 wrote to memory of 2728 2876 1.exe 31 PID 2876 wrote to memory of 2728 2876 1.exe 31 PID 2876 wrote to memory of 2728 2876 1.exe 31 PID 2876 wrote to memory of 2728 2876 1.exe 31 PID 2876 wrote to memory of 2728 2876 1.exe 31 PID 2876 wrote to memory of 2728 2876 1.exe 31 PID 2808 wrote to memory of 2616 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2616 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2616 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2616 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2616 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2616 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2616 2808 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5f352c911c2ccb5a0ffc2be2fe5057633
SHA13b3db1e22eba45ba3c71c5771a991a61fa415291
SHA2563a5b8c5faf22d955f5ef36508dc8bc578a4b056ac3bb296feed2fe9cecc5e33f
SHA512d6b1426cedee674b28eb087e46a22996879865a8f88d54ac4e1b9f71948e7481ed6144cbe4fb7856954e8d767f240f4a7bbe76ffee92dcaca998b6129f1df0fb
-
Filesize
134KB
MD5d581068e84510083ddea45e821ebde36
SHA1beebba90686dafbd91dbb17ab37a9442ea9c5521
SHA256fa04f7f08277b74677628a224a096d4b9fe4cafb7eff9f9d92e2ad776085959d
SHA512aac289c9d7733da47fcd7c25062963a4ce8531fd011479c950c5ee5bada7dba6221cb30a0950ce8f3ee2cc9bbac8ecfedbf9947c18a889589e39473d9b6e98fa