Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/07/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe
-
Size
182KB
-
MD5
59a26f36611a8cd5d55d81e62e77cb27
-
SHA1
9f28e2374d4f68f4077c634dce69883725e3da95
-
SHA256
14810b5d44de87d87ef0cc5ff3d27b89ce67d67d91b85b95124e270472dbff6a
-
SHA512
e457a7e9c5c4b8a0d3f431abe2c75997f2c98758c42cc0c123ffa761b7fcce528788a632887b281b85ac2385e334016aab136b7e072300e5f26a11761210f08a
-
SSDEEP
3072:jg7Df4l6JrOJtdtOT4q0nmDM5qD5nAICAfxx2YltgDZmPSg4FdiJ2NPI9fh4:jg3G6JyJ1Ot0n7kDxwAfL2stgDLg4eJW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\dwm.exe" 59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2340-2-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1352-12-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1352-11-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/1352-14-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2340-76-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2572-79-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2572-78-0x0000000000400000-0x000000000048C000-memory.dmp upx behavioral1/memory/2340-193-0x0000000000400000-0x000000000048C000-memory.dmp upx -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1352 2340 59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1352 2340 59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1352 2340 59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1352 2340 59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2572 2340 59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe 33 PID 2340 wrote to memory of 2572 2340 59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe 33 PID 2340 wrote to memory of 2572 2340 59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe 33 PID 2340 wrote to memory of 2572 2340 59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft2⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\59a26f36611a8cd5d55d81e62e77cb27_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54cd1649f798a0d692e058e48855be6b0
SHA1bed91c651c96ffce23309c496f425d78c4c4b363
SHA2569300b5323ac8cdef9bfa90ed888e3759b8ee413cfacf689587cd5a3b907e91f6
SHA51203c7625695af501f91d14c53926973678c823e95c575d90b1d6590de2e3170b7d6e34827c1889c30bcb382f29822f95f47bf61799084c7800cea3d731f67d885
-
Filesize
600B
MD541906deec1bb3fe1dc9798625548a959
SHA19334c26328d240dd20f27183841577d211effd82
SHA25614993ca8c4370003a4187acc49673f5137c7e8311b1630680832c9945e45fb62
SHA512cb9f43031e78cedaad8520a85bfedb98dccc7d17a5c7a4bf4d1e97dc0cd417556c3419e7e6c147ffd7b8bc2fcbe855ed0bcd4487b406f363cfe7a49998ed3910
-
Filesize
996B
MD55d75dd34eadf1d505198015f4c636aed
SHA1cb53be7e87ed867794ba4ab118fed7e6bbc19f12
SHA256807966f413c2d430bee2fc4921865de4cec96db7cfb45a766956e3f3019fdcde
SHA512530253e963bb1517519fc9aa69ed3fc2ded2e1d0431eee26e63bd38d141ed0307622882f231c4960313cf37ee1ce349e782fc97630173db04d969935dca2c22c