Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe
-
Size
356KB
-
MD5
4b9418d95fc77669722d953c4f95299b
-
SHA1
c2267de207d9efa6943a04dace9dae57d3eff149
-
SHA256
215fcc962beb1adbe6ae295cf9363874aa1d74b8a2397cf7fed54315c031a9a4
-
SHA512
8b0495c5561113c4b7527f1eaf8e46a82ee8669e37bc2c8f4e8dd35dd11666a16ef822e46a8b36ba65541752332bef931af5b70ed3f57aff5d3b3f5ecff20c26
-
SSDEEP
6144:7vbx8x3ZYpRpmbXMXTP9598vATqn4ums/6GGt:7A8Rpmu5yY2nNG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 S0IYYaErwg.exe -
Executes dropped EXE 2 IoCs
pid Process 2116 S0IYYaErwg.exe 2744 S0IYYaErwg.exe -
Loads dropped DLL 5 IoCs
pid Process 2020 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 2020 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 2020 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 2116 S0IYYaErwg.exe 2744 S0IYYaErwg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\wlk624RR = "C:\\ProgramData\\KDPPMSiwEKoAKg0Q\\S0IYYaErwg.exe" 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2288 set thread context of 2020 2288 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 31 PID 2116 set thread context of 2744 2116 S0IYYaErwg.exe 33 PID 2744 set thread context of 2820 2744 S0IYYaErwg.exe 34 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2020 2288 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2020 2288 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2020 2288 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2020 2288 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2020 2288 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2020 2288 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 31 PID 2020 wrote to memory of 2116 2020 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 32 PID 2020 wrote to memory of 2116 2020 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 32 PID 2020 wrote to memory of 2116 2020 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 32 PID 2020 wrote to memory of 2116 2020 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 32 PID 2116 wrote to memory of 2744 2116 S0IYYaErwg.exe 33 PID 2116 wrote to memory of 2744 2116 S0IYYaErwg.exe 33 PID 2116 wrote to memory of 2744 2116 S0IYYaErwg.exe 33 PID 2116 wrote to memory of 2744 2116 S0IYYaErwg.exe 33 PID 2116 wrote to memory of 2744 2116 S0IYYaErwg.exe 33 PID 2116 wrote to memory of 2744 2116 S0IYYaErwg.exe 33 PID 2744 wrote to memory of 2820 2744 S0IYYaErwg.exe 34 PID 2744 wrote to memory of 2820 2744 S0IYYaErwg.exe 34 PID 2744 wrote to memory of 2820 2744 S0IYYaErwg.exe 34 PID 2744 wrote to memory of 2820 2744 S0IYYaErwg.exe 34 PID 2744 wrote to memory of 2820 2744 S0IYYaErwg.exe 34 PID 2744 wrote to memory of 2820 2744 S0IYYaErwg.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\ProgramData\KDPPMSiwEKoAKg0Q\S0IYYaErwg.exe"C:\ProgramData\KDPPMSiwEKoAKg0Q\S0IYYaErwg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\ProgramData\KDPPMSiwEKoAKg0Q\S0IYYaErwg.exe"C:\ProgramData\KDPPMSiwEKoAKg0Q\S0IYYaErwg.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /i:27445⤵PID:2820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD54b9418d95fc77669722d953c4f95299b
SHA1c2267de207d9efa6943a04dace9dae57d3eff149
SHA256215fcc962beb1adbe6ae295cf9363874aa1d74b8a2397cf7fed54315c031a9a4
SHA5128b0495c5561113c4b7527f1eaf8e46a82ee8669e37bc2c8f4e8dd35dd11666a16ef822e46a8b36ba65541752332bef931af5b70ed3f57aff5d3b3f5ecff20c26