Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
14s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 09:07
Behavioral task
behavioral1
Sample
452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe
-
Size
33KB
-
MD5
452c03079c479667f61a329eeebf79b0
-
SHA1
812785745a1aad6bf53486b6558252a47dcb4d39
-
SHA256
993ba2778a53990821d0fc5d16e597a6df53c9ba47d3a1dfee102872f58de015
-
SHA512
c8cda4e5e3b54db22ba970152d41348748a1f26d8732c19bb06ded980d7918318868122d54d5cc25c468a481b283abc5be8c762c9da41ef8f8581f8405822255
-
SSDEEP
768:EuUv9Fk8jvbj3BmXPwO80I/w2U2zNH9ykEhBr4KNY1oggihr:ExLk8j/RmXF8dtzNH9xEYFOU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3032 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 rundll32.exe -
resource yara_rule behavioral1/memory/1996-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1996-10-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\midimap.dll 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysapp28.dll 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe File created C:\Windows\SysWOW64\YUksuser.dll 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\YUksuser.dll 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe File created C:\Windows\SysWOW64\ksuser.dll 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe File created C:\Windows\SysWOW64\dllcache\ksuser.dll 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe File created C:\Windows\SysWOW64\YUmidimap.dll 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe File created C:\Windows\SysWOW64\midimap.dll 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2476 sc.exe 2456 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2404 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2404 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2404 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2404 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 29 PID 1996 wrote to memory of 2456 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 30 PID 1996 wrote to memory of 2456 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 30 PID 1996 wrote to memory of 2456 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 30 PID 1996 wrote to memory of 2456 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 30 PID 1996 wrote to memory of 2476 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 31 PID 1996 wrote to memory of 2476 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 31 PID 1996 wrote to memory of 2476 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 31 PID 1996 wrote to memory of 2476 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 31 PID 1996 wrote to memory of 3032 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 34 PID 1996 wrote to memory of 3032 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 34 PID 1996 wrote to memory of 3032 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 34 PID 1996 wrote to memory of 3032 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 34 PID 1996 wrote to memory of 3032 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 34 PID 1996 wrote to memory of 3032 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 34 PID 1996 wrote to memory of 3032 1996 452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe 34 PID 2404 wrote to memory of 2728 2404 net.exe 36 PID 2404 wrote to memory of 2728 2404 net.exe 36 PID 2404 wrote to memory of 2728 2404 net.exe 36 PID 2404 wrote to memory of 2728 2404 net.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\452c03079c479667f61a329eeebf79b0_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\net.exenet stop cryptsvc2⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cryptsvc3⤵PID:2728
-
-
-
C:\Windows\SysWOW64\sc.exesc config cryptsvc start= disabled2⤵
- Launches sc.exe
PID:2456
-
-
C:\Windows\SysWOW64\sc.exesc delete cryptsvc2⤵
- Launches sc.exe
PID:2476
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Users\Admin\AppData\Local\Temp\1720948063.dat, ServerMain c:\users\admin\appdata\local\temp\452c03079c479667f61a329eeebf79b0_jaffacakes118.exe2⤵
- Deletes itself
- Loads dropped DLL
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5eee3c37298639cd1c47dfce399e422ea
SHA14a2928b3a251bdac5573d797722de18bdefc97a2
SHA256374da93eaa08af95f3e7fbac3499b3791236f29960e11b4168c0ffd945824784
SHA512b459a1c699adca9f4f7ff4f46a4389c3a2c9e26d4829b0c46782e8db7299701d1d4c2382aa5c1f9435012b311abb94eef4128f49eb270fcdec9b60914925d5f5