Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
4d6956af35f20e9e450e3764f93f7002
-
SHA1
bb29842aa46edf5699f8d13aaa32daa4e8571c33
-
SHA256
c3466a9ff9243efe9a6de5152f92c745e0f355f81769037bda306918a82cdd34
-
SHA512
4ec87803ca6db1bdadcdffb925ff12b70b039c6a16ac29b6106df0a956d625da28c325393f9371e9114a9eb60b9930df25eebec4dca102895ebe2a7a6a89a1ca
-
SSDEEP
24576:RBgyjZumcNJjM1dHrMgGfQZmiZLjej/qJOo9yevNTnEgXjGpwH2bmot9:RduLj68Iej/qko9B5RibpT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2260 ctfmon.exe 2528 Eirador Multi v1861.exe -
Loads dropped DLL 13 IoCs
pid Process 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 2260 ctfmon.exe 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 2260 ctfmon.exe 2528 Eirador Multi v1861.exe 2528 Eirador Multi v1861.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe 2456 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon = "\"C:\\Users\\Admin\\AppData\\Local\\ctfmon.exe\"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2456 2260 WerFault.exe 30 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2668 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2260 ctfmon.exe 2260 ctfmon.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2260 ctfmon.exe 2260 ctfmon.exe 2528 Eirador Multi v1861.exe 2528 Eirador Multi v1861.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2260 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2260 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2260 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2260 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 30 PID 2872 wrote to memory of 2528 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 31 PID 2872 wrote to memory of 2528 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 31 PID 2872 wrote to memory of 2528 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 31 PID 2872 wrote to memory of 2528 2872 4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe 31 PID 2260 wrote to memory of 2700 2260 ctfmon.exe 32 PID 2260 wrote to memory of 2700 2260 ctfmon.exe 32 PID 2260 wrote to memory of 2700 2260 ctfmon.exe 32 PID 2260 wrote to memory of 2700 2260 ctfmon.exe 32 PID 2260 wrote to memory of 2700 2260 ctfmon.exe 32 PID 2260 wrote to memory of 2700 2260 ctfmon.exe 32 PID 2260 wrote to memory of 2700 2260 ctfmon.exe 32 PID 2700 wrote to memory of 2696 2700 cmd.exe 34 PID 2700 wrote to memory of 2696 2700 cmd.exe 34 PID 2700 wrote to memory of 2696 2700 cmd.exe 34 PID 2700 wrote to memory of 2696 2700 cmd.exe 34 PID 2696 wrote to memory of 2668 2696 cmd.exe 35 PID 2696 wrote to memory of 2668 2696 cmd.exe 35 PID 2696 wrote to memory of 2668 2696 cmd.exe 35 PID 2696 wrote to memory of 2668 2696 cmd.exe 35 PID 2260 wrote to memory of 2456 2260 ctfmon.exe 36 PID 2260 wrote to memory of 2456 2260 ctfmon.exe 36 PID 2260 wrote to memory of 2456 2260 ctfmon.exe 36 PID 2260 wrote to memory of 2456 2260 ctfmon.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\ctfmon.exe"C:\Users\Admin\AppData\Local\ctfmon.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\winupdate.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\ctfmon.exe\"" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\ctfmon.exe\"" /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:2668
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 5763⤵
- Loads dropped DLL
- Program crash
PID:2456
-
-
-
C:\Users\Admin\AppData\Local\Eirador Multi v1861.exe"C:\Users\Admin\AppData\Local\Eirador Multi v1861.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD5f75271341aacb5971293c8483a89bc83
SHA1c90ef90dd26977763e5f35a3f7c89268dbe83fbd
SHA256e1f428dada2c4611ff6acc2b61672e92b2ca42b67015bfbabde458224c61b1b1
SHA512db401e289e9b3d1f5258e3a2c60e0113c2195c8acd5712c2e97f058f916e2008e9b846119b4cbbd26337e2f62b9b0f21cd046f07c6c166d3bcf43f689a3397a7
-
Filesize
268KB
MD5ed174f4a9bd2409068db32757b3bc384
SHA1397d786a611a5f02932839df7a6a630a656516eb
SHA2563aedc83eb1a417e83f99cc5aa956f0cf3de3fdd5083b0e9c3f7ced24cf074eaf
SHA512d19c6c7ddd59b85d3337362521fe622c94df1d7c9f53e6be38a61969feb3d9c9b3bac0b318c729a6a5e91419f0e1a85954ba4f58c0baac6ac5f6dbb47950a305
-
Filesize
72KB
MD5395c78df12233992b0a2a4de48e8d7ed
SHA1735cebcca0b8945d2f562605b93921fb3a7c960b
SHA25649c842ab6754bdef2cf3443c7b63bcc854deda5474424754af741b42de3ae825
SHA512d66a755ed45670e34296727d67fae83fbff0c7fe286feab73e2df37717185627449c4a63deffeeb013ac61935f344245b7f75f90153cef70ddc0109721bb86c8
-
Filesize
400KB
MD52cccaa37025aaa3967f2cc6db25d0c68
SHA1791d7f8ef09ffe60ce4423aee3fdc382b188fc23
SHA2563d9ae884f80a509b3120872e1126ce273902a1cfe3e28fd862484a8e755257ea
SHA51249f08d950652ece90ba5cc4d45222cdc138debefbaabc10c7ec93b9a45d9c6f92b32c68a441a9405fd8397e09fadd56846504e295e25ff0e69e6fde156f8bb01
-
Filesize
560KB
MD5a8072393ca67951159b23630acd2971b
SHA14c986472e2320f0a522e655820a31a76db418efc
SHA256734d16d34150addd7b9e5c34072be244ddc743ecdcb5e5745d91c3ee7298b88a
SHA512c0b6d87225637cabecfa39a3ce8e12b77e8b8865b53a5981401ca452012d966ffa5e0b400a48acd63649c543755111034c9d8ea4366cebc37b1a65afef5dda89