Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe
-
Size
7KB
-
MD5
5bcddbaa0acbbb0878fc86aa98fbdc5d
-
SHA1
15cb73aa294a434beec7c5d739f7a81424a98cc5
-
SHA256
24d481c7fac417539b600d7336fb4793d7f43c047f59dfe0cf6b221474f20b10
-
SHA512
ebea4b9ee24d3ea76590342111d0fef06daa81755cb20765ac1ddfed7a52f59474fa675f1dda12037564a1e49246a9844b34cd51b7261543a7c6aeded408d271
-
SSDEEP
96:PFgCQwDv0234J3j4t0U22PYk0QAMvu4aB1SZODZaAKfdo2gepYq6NCtl:PmCQQ0m4ljr2QGvzaBOQhYdoopYq6sl
Malware Config
Signatures
-
Unexpected DNS network traffic destination 7 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 216.240.136.66 Destination IP 64.69.47.101 Destination IP 216.240.136.66 Destination IP 64.69.47.101 Destination IP 64.69.47.101 Destination IP 216.240.136.66 Destination IP 64.69.47.101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1884 3024 5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1884 3024 5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1884 3024 5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe 31 PID 3024 wrote to memory of 1884 3024 5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe 31 PID 1884 wrote to memory of 352 1884 cmd.exe 33 PID 1884 wrote to memory of 352 1884 cmd.exe 33 PID 1884 wrote to memory of 352 1884 cmd.exe 33 PID 1884 wrote to memory of 352 1884 cmd.exe 33 PID 1884 wrote to memory of 2708 1884 cmd.exe 34 PID 1884 wrote to memory of 2708 1884 cmd.exe 34 PID 1884 wrote to memory of 2708 1884 cmd.exe 34 PID 1884 wrote to memory of 2708 1884 cmd.exe 34 PID 1884 wrote to memory of 2576 1884 cmd.exe 35 PID 1884 wrote to memory of 2576 1884 cmd.exe 35 PID 1884 wrote to memory of 2576 1884 cmd.exe 35 PID 1884 wrote to memory of 2576 1884 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5bcddbaa0acbbb0878fc86aa98fbdc5d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\laa.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\netsh.exenetsh interface ip set dns "Local Area Connection" static "64.69.47.101"3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:352
-
-
C:\Windows\SysWOW64\netsh.exenetsh interface ip add dns "Local Area Connection" 216.240.136.66 23⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2708
-
-
C:\Windows\SysWOW64\netsh.exenetsh interface ip set dns "Local Area Connection* 2" static "64.69.47.101"3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58a10d5d07b5edc5b295af7a7441e9e8e
SHA1e456fe1012f5009e808986e32777cec155430430
SHA256b3addb577da60184724b0c423322a7ed73b9e915a646babd04e3e3c46b8c40ea
SHA51258bc823c6dcd3dfcaf19176d04dfdb7060dd7d20d78273bff65c366042d79191fd8d5999607be57128cbbc17588ee4970eebf8e96fd0e2f116c837f195c7f841