Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe
-
Size
270KB
-
MD5
493d2249ba96745e2bd66674092f957d
-
SHA1
38cf57f248457f2b2e64393396c46950eb824224
-
SHA256
a162b52627b54e0ac8732b3202161110239b9fef3ba483e54863bcc022d4d86d
-
SHA512
aea5e6e6346d7e1408c52e3e8f04d864aa7d0dc2062b26e63180f37620ef2a2accac101b9322fd85e7591e1552e7c8fe7f69dc43e9052cf0dc0f968db03abf45
-
SSDEEP
6144:BtjpcmqvoArlO+Beir2/pWTxq/fnx7GDrRcJIcxyCq0hzfF:3Avo89Vq/PERcHxywF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2004 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 ybas.exe -
Loads dropped DLL 2 IoCs
pid Process 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\{09E0E5E8-6808-AD4F-43B0-714965AC5254} = "C:\\Users\\Admin\\AppData\\Roaming\\Ziisp\\ybas.exe" ybas.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2496 set thread context of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe 3028 ybas.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 3028 ybas.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3028 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 30 PID 2496 wrote to memory of 3028 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 30 PID 2496 wrote to memory of 3028 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 30 PID 2496 wrote to memory of 3028 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 30 PID 3028 wrote to memory of 1108 3028 ybas.exe 19 PID 3028 wrote to memory of 1108 3028 ybas.exe 19 PID 3028 wrote to memory of 1108 3028 ybas.exe 19 PID 3028 wrote to memory of 1108 3028 ybas.exe 19 PID 3028 wrote to memory of 1108 3028 ybas.exe 19 PID 3028 wrote to memory of 1192 3028 ybas.exe 20 PID 3028 wrote to memory of 1192 3028 ybas.exe 20 PID 3028 wrote to memory of 1192 3028 ybas.exe 20 PID 3028 wrote to memory of 1192 3028 ybas.exe 20 PID 3028 wrote to memory of 1192 3028 ybas.exe 20 PID 3028 wrote to memory of 1240 3028 ybas.exe 21 PID 3028 wrote to memory of 1240 3028 ybas.exe 21 PID 3028 wrote to memory of 1240 3028 ybas.exe 21 PID 3028 wrote to memory of 1240 3028 ybas.exe 21 PID 3028 wrote to memory of 1240 3028 ybas.exe 21 PID 3028 wrote to memory of 1304 3028 ybas.exe 23 PID 3028 wrote to memory of 1304 3028 ybas.exe 23 PID 3028 wrote to memory of 1304 3028 ybas.exe 23 PID 3028 wrote to memory of 1304 3028 ybas.exe 23 PID 3028 wrote to memory of 1304 3028 ybas.exe 23 PID 3028 wrote to memory of 2496 3028 ybas.exe 29 PID 3028 wrote to memory of 2496 3028 ybas.exe 29 PID 3028 wrote to memory of 2496 3028 ybas.exe 29 PID 3028 wrote to memory of 2496 3028 ybas.exe 29 PID 3028 wrote to memory of 2496 3028 ybas.exe 29 PID 2496 wrote to memory of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31 PID 2496 wrote to memory of 2004 2496 493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1108
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1192
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\493d2249ba96745e2bd66674092f957d_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\Ziisp\ybas.exe"C:\Users\Admin\AppData\Roaming\Ziisp\ybas.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpbd0ce14f.bat"3⤵
- Deletes itself
PID:2004
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5b194548cfcbe120f4d0e3ac601778f52
SHA1de6583aadbf49437c66b87e9dc46974f7ce65626
SHA256a4a3f9a8390206448334f01de7ceb3071da8f537b5e6b537a322027af934d521
SHA512ad08923db675d06104368259229ffb283df3a00eefea58f41bc6d9ddd689faf5a235b47c5decf08e36200ffd0b461b8223e13aaec5cceb5973e2dc5f53c366ac
-
Filesize
270KB
MD51ef2c94ff2ee351658c952c559219a9b
SHA15cac28d4567e29589d3c5b8e72974ba652af8a33
SHA256038f2ca060e55043d7cf4fbe3c7474a3cd62584ccbd43af73716541e3e4cc901
SHA512dba18a9b46480c234a38241eef5f74e4419779e7348bd8502873deab5e2deaea3b27adefacc5e77d03281907a1d37aa8febff8fb41f66ddfe86dcd019c8a5d7a