Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe
-
Size
294KB
-
MD5
602f9cd0196bc88bf16d0da947a7ac3c
-
SHA1
0c81bbf8787bd9d4e7e2c4d15b24c681cffa2b40
-
SHA256
3464b4c936f473a68b862438e945a52060389ae8ec915ad6837072477392bab9
-
SHA512
502dc35ee635788468a09ff78b78dd8e5a73a06606920a96ac431c9f9e9c7f70feb859cf27bb00c9dccc1d27e58b7c0756710026db3aaf97bb40a21d7debadd3
-
SSDEEP
6144:uiGtsLDAlqNC+L+1PTG/qm/PgCnmUSFMhl4O+M/oI29AK9:FGtsLct+y1PTEn/iUSFM8O+rI2z9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2228 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 316 rair.exe -
Loads dropped DLL 2 IoCs
pid Process 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\{15320D28-6FEE-AD4F-3AAA-40C7281D63DA} = "C:\\Users\\Admin\\AppData\\Roaming\\Kikaa\\rair.exe" rair.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1688 set thread context of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe 316 rair.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 316 rair.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1688 wrote to memory of 316 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 30 PID 1688 wrote to memory of 316 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 30 PID 1688 wrote to memory of 316 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 30 PID 1688 wrote to memory of 316 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 30 PID 316 wrote to memory of 1100 316 rair.exe 19 PID 316 wrote to memory of 1100 316 rair.exe 19 PID 316 wrote to memory of 1100 316 rair.exe 19 PID 316 wrote to memory of 1100 316 rair.exe 19 PID 316 wrote to memory of 1100 316 rair.exe 19 PID 316 wrote to memory of 1164 316 rair.exe 20 PID 316 wrote to memory of 1164 316 rair.exe 20 PID 316 wrote to memory of 1164 316 rair.exe 20 PID 316 wrote to memory of 1164 316 rair.exe 20 PID 316 wrote to memory of 1164 316 rair.exe 20 PID 316 wrote to memory of 1192 316 rair.exe 21 PID 316 wrote to memory of 1192 316 rair.exe 21 PID 316 wrote to memory of 1192 316 rair.exe 21 PID 316 wrote to memory of 1192 316 rair.exe 21 PID 316 wrote to memory of 1192 316 rair.exe 21 PID 316 wrote to memory of 1256 316 rair.exe 23 PID 316 wrote to memory of 1256 316 rair.exe 23 PID 316 wrote to memory of 1256 316 rair.exe 23 PID 316 wrote to memory of 1256 316 rair.exe 23 PID 316 wrote to memory of 1256 316 rair.exe 23 PID 316 wrote to memory of 1688 316 rair.exe 29 PID 316 wrote to memory of 1688 316 rair.exe 29 PID 316 wrote to memory of 1688 316 rair.exe 29 PID 316 wrote to memory of 1688 316 rair.exe 29 PID 316 wrote to memory of 1688 316 rair.exe 29 PID 1688 wrote to memory of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31 PID 1688 wrote to memory of 2228 1688 602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\602f9cd0196bc88bf16d0da947a7ac3c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\Kikaa\rair.exe"C:\Users\Admin\AppData\Roaming\Kikaa\rair.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa01870ef.bat"3⤵
- Deletes itself
PID:2228
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD566aeab44a02fb83263a1f47a2e4dd32a
SHA12e9f9511cea5060dc8d2e01d8a8fdaa3fbda697e
SHA25668e8e1a388a15bdf9eeffe028050b331b43f4c70d45c4b845b8e6c9f00950538
SHA512b35cb415e367f7d35a218dad5a47404bbd11b7efa1f7a5ab5bb80bf473da6b0669fdd6997761116ff334dc5aa347118542ca99ab484c34854fda9e2c1b79fdc1
-
Filesize
294KB
MD5f1d6193bb74503c2598e95c9ec1118d5
SHA1eb8034002b542c2e5efdda5f0355b4694c93d6e8
SHA256e75856b982c2127c6d9a3fc1c1765eabe9a7b169c1d33bc8436af2976c4fec21
SHA512075c8494c40d22b3323dab593d10920ef36a04155812dbdb46b101243399be286a4666cd0ae5913fc6c1dad10a7f5be15042efcada1eb2b7623aad03c820a52e