Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 20:33
Behavioral task
behavioral1
Sample
433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe
-
Size
212KB
-
MD5
433cea8bc34cece132c891010bf96ef7
-
SHA1
f516fa0e92de8cab74d9a24bb37bfab991ed4dd2
-
SHA256
f0549dc5ffc5d89866f700a3c53d2dcac948c6149fe96d56129cf9e0fc5b8c85
-
SHA512
d2053334ecf49c897485152a5ab799a68e7ea7e34b9299742ad936ad44c0b0e03228b2cabf55f58a80d63ef9d5769155055cc0101c90262d1658707437ef35cd
-
SSDEEP
6144:jAEkK6rmEnOwO6esxm1XwY7XEjZufoKEy:8T3rnOwO8xm1XPX8qwy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 Uhelya.exe -
resource yara_rule behavioral1/memory/2640-0-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral1/files/0x0008000000016c7c-11.dat upx behavioral1/memory/2844-13-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\DFGQBFFUUO = "C:\\Windows\\Uhelya.exe" Uhelya.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe File created C:\Windows\Uhelya.exe 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe File opened for modification C:\Windows\Uhelya.exe 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main Uhelya.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe 2844 Uhelya.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2640 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe 2844 Uhelya.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2844 2640 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe 30 PID 2640 wrote to memory of 2844 2640 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe 30 PID 2640 wrote to memory of 2844 2640 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe 30 PID 2640 wrote to memory of 2844 2640 433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\433cea8bc34cece132c891010bf96ef7_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\Uhelya.exeC:\Windows\Uhelya.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372B
MD5875d930bf256af0ae6be4bd818408086
SHA14b76800d8b32678ce90fe05dff0ef78b0ce08825
SHA2560c01e4faef7aa5afc02dce3e8feff9a5048784b6bbf6734985274cec9faf9752
SHA512a0825dd338c1186b47be8adbcb3707075315ba5d769e9bfee8c023e9befa475d6ceab63a3ad41015c7a033afa2a7a180e41833893ff40e6b98d8fdf23bf98c3e
-
Filesize
212KB
MD5433cea8bc34cece132c891010bf96ef7
SHA1f516fa0e92de8cab74d9a24bb37bfab991ed4dd2
SHA256f0549dc5ffc5d89866f700a3c53d2dcac948c6149fe96d56129cf9e0fc5b8c85
SHA512d2053334ecf49c897485152a5ab799a68e7ea7e34b9299742ad936ad44c0b0e03228b2cabf55f58a80d63ef9d5769155055cc0101c90262d1658707437ef35cd