Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 07:52 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe
-
Size
349KB
-
MD5
5b0d5577ddb7a04cddf45f001f914da6
-
SHA1
998a3809d1ed3ab979f539a2c82fa62c255a243f
-
SHA256
d561c8f04a28962cb8cc916dfa36756e46e42ab51398ea6394538c0228f1569c
-
SHA512
f3bda9b69e560bc85313ff54941d64bf54af2efce08cf3d117432bc668ba725610f6fd2fee50251915f63672b0b3242dd27e417c9e2a20c526ca5cfffa7ad017
-
SSDEEP
6144:m2nrFszwRUE++PJj1YdcU0wZy4pmAMWuNf:m0hx1tw9JMff
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 292 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 jeades.exe -
Loads dropped DLL 1 IoCs
pid Process 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C4A05C48-6809-AD4F-9B76-1BFCA18838E1} = "C:\\Users\\Admin\\AppData\\Roaming\\Ynojok\\jeades.exe" jeades.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1596 set thread context of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe 2128 jeades.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 2128 jeades.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2128 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 31 PID 1596 wrote to memory of 2128 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 31 PID 1596 wrote to memory of 2128 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 31 PID 1596 wrote to memory of 2128 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 31 PID 2128 wrote to memory of 1120 2128 jeades.exe 19 PID 2128 wrote to memory of 1120 2128 jeades.exe 19 PID 2128 wrote to memory of 1120 2128 jeades.exe 19 PID 2128 wrote to memory of 1120 2128 jeades.exe 19 PID 2128 wrote to memory of 1120 2128 jeades.exe 19 PID 2128 wrote to memory of 1200 2128 jeades.exe 20 PID 2128 wrote to memory of 1200 2128 jeades.exe 20 PID 2128 wrote to memory of 1200 2128 jeades.exe 20 PID 2128 wrote to memory of 1200 2128 jeades.exe 20 PID 2128 wrote to memory of 1200 2128 jeades.exe 20 PID 2128 wrote to memory of 1252 2128 jeades.exe 21 PID 2128 wrote to memory of 1252 2128 jeades.exe 21 PID 2128 wrote to memory of 1252 2128 jeades.exe 21 PID 2128 wrote to memory of 1252 2128 jeades.exe 21 PID 2128 wrote to memory of 1252 2128 jeades.exe 21 PID 2128 wrote to memory of 888 2128 jeades.exe 25 PID 2128 wrote to memory of 888 2128 jeades.exe 25 PID 2128 wrote to memory of 888 2128 jeades.exe 25 PID 2128 wrote to memory of 888 2128 jeades.exe 25 PID 2128 wrote to memory of 888 2128 jeades.exe 25 PID 2128 wrote to memory of 1596 2128 jeades.exe 30 PID 2128 wrote to memory of 1596 2128 jeades.exe 30 PID 2128 wrote to memory of 1596 2128 jeades.exe 30 PID 2128 wrote to memory of 1596 2128 jeades.exe 30 PID 2128 wrote to memory of 1596 2128 jeades.exe 30 PID 1596 wrote to memory of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32 PID 1596 wrote to memory of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32 PID 1596 wrote to memory of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32 PID 1596 wrote to memory of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32 PID 1596 wrote to memory of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32 PID 1596 wrote to memory of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32 PID 1596 wrote to memory of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32 PID 1596 wrote to memory of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32 PID 1596 wrote to memory of 292 1596 5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1200
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b0d5577ddb7a04cddf45f001f914da6_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\Ynojok\jeades.exe"C:\Users\Admin\AppData\Roaming\Ynojok\jeades.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp46e224f0.bat"3⤵
- Deletes itself
PID:292
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:888
Network
- No results found
-
222 B 1
-
263 B 1
-
240 B 1
-
148 B 1
-
121 B 1
-
175 B 1
-
258 B 1
-
218 B 1
-
112 B 1
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5d4740c966fb41b97e6cd897e8c9554cd
SHA17e91136e71e5fa979a7bbfcb2d66a712aafc7d3d
SHA2567f8ecaddfaf2bce49159f683b6f17f96c2c3e80c26bfcfb4f2f4ddeb01b0f4cc
SHA51252cc7760b6804f175255ce47f0e1aa40f768b0a48912a0fbc7c5f938b6df5f08d3a95195cb4deeb445a79a52851220861379a876da9bc6b18ceb434afd1f1eff
-
Filesize
349KB
MD5b15ba192e4ec889fc1eabed2bd3b8245
SHA19167bd4e5524a76b94f2b5e3db0f9a2d12c0bf3b
SHA256d110a288b76386e67808484d90402f7e5ac4e895ccf9e89c236e7ecec61e5a7f
SHA5126c7102de06ac3cdcd0ce42395a214cda36caf25d109b2702b04c3e8cd12c78e6260860626c07b2735411e38ac3714e894370af92e5e7f62b2f65d3ebb0f8b785