Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe
-
Size
165KB
-
MD5
5a4398f51e01b23c23769793ae6105cd
-
SHA1
058c1f0cc30fd7b795b10c3485b9d846d26648ec
-
SHA256
0eb09f5c800a01e103075e07b842d754bf78e0f7f5ece90d4dcb86d605036c8d
-
SHA512
7d041217c541870262882494a8d0d6b8eb185cb0d9d7ca5de85165a36f37aa328bd0948cc8200ec6adf9bff809461b7b53934a9353cd7bdb761dd33a5d5aa384
-
SSDEEP
3072:bKdwnC2FbHW5yLQfeigjKC8Q2/b+iL8nuiJZHp3U:Znxb2QQmiWKJ5b+A8nuiJZHp3
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2140-2-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2128-11-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2128-13-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2140-85-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2652-86-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2652-88-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral1/memory/2140-194-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2128 2140 5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2128 2140 5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2128 2140 5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2128 2140 5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2652 2140 5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe 33 PID 2140 wrote to memory of 2652 2140 5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe 33 PID 2140 wrote to memory of 2652 2140 5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe 33 PID 2140 wrote to memory of 2652 2140 5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD52eab7e9561de21551a75a50530024f66
SHA1659d7894ee14bfe8504ebbb93f802368c088fe29
SHA2565499b56ca759d932b50fc0d1c4625d68aac89b6920809d7610519d92dd4b4815
SHA5123f170cb224022310220e4b1f262505c29ba9c0552999b7c03e4dfc781541c563586f4ae8ac7ed39919069046fedcf5c282c8694482baa85b252b1d5265b1e64b
-
Filesize
1KB
MD52a65ecf7b76c1a5ba0eafc318920fa04
SHA160d502c0e97694af16bb94f6ce39ef796ead9ca2
SHA2561b1361a44790e2e3a3c5572e9b980505232290c7d6f77546c2a3a02b9195c1de
SHA51283e169b1e85b1834dbf96e1ca6f241771e87c8bc6b472260a221c6dacedfd4bd28f48f0fae0df6f7e3003262a65fc8348a6a62942cebe9122bceeeb70d5e92d9
-
Filesize
996B
MD5c77230f395a495e50fd287f90d2f4a0a
SHA10c46958a8f31125796576cd143c00d448831bec6
SHA256d509d7d185cddad53f79698c94dca7c2f7146aba9c5aa094919f290482f1381a
SHA5126da13f04816a7c8fffbfb637f4d044029e553fe3bbf4b19d1cbe7859676b9413a63b04060ccf75c669c43db67666a1900591f20013f1424f9acbfbaa69a42f40