Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe
-
Size
364KB
-
MD5
5f05977fa039dab76e94eae857888ef9
-
SHA1
e7be6f93d54efa29c51fa17ecb631bfe013d54b3
-
SHA256
ccffc48c6a40f652e8fc85adbc88bc868fea5b7fd0370f25490bf64c19751cc8
-
SHA512
4e2e1b82b67d087a86caa684a020ac59108de453d3cac6a185d674108ec3ad003156dafa35f80e3be9fe44bc2585610cc98dfbecfd3775cada21cebfc47a52a6
-
SSDEEP
6144:nbCdh+yzFFSIX0zE9NKFEWNFfK4CS0NwIx2+fFBFFrki9:nmd0WSIXxcXNkjNxZf1Frh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1824 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1552 ehrui.exe -
Loads dropped DLL 2 IoCs
pid Process 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\{C6C07C68-68EF-AD4F-3837-F372201AD06F} = "C:\\Users\\Admin\\AppData\\Roaming\\Anuhy\\ehrui.exe" ehrui.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1472 set thread context of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe 1552 ehrui.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 1552 ehrui.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1552 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 30 PID 1472 wrote to memory of 1552 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 30 PID 1472 wrote to memory of 1552 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 30 PID 1472 wrote to memory of 1552 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 30 PID 1552 wrote to memory of 1028 1552 ehrui.exe 17 PID 1552 wrote to memory of 1028 1552 ehrui.exe 17 PID 1552 wrote to memory of 1028 1552 ehrui.exe 17 PID 1552 wrote to memory of 1028 1552 ehrui.exe 17 PID 1552 wrote to memory of 1028 1552 ehrui.exe 17 PID 1552 wrote to memory of 1092 1552 ehrui.exe 19 PID 1552 wrote to memory of 1092 1552 ehrui.exe 19 PID 1552 wrote to memory of 1092 1552 ehrui.exe 19 PID 1552 wrote to memory of 1092 1552 ehrui.exe 19 PID 1552 wrote to memory of 1092 1552 ehrui.exe 19 PID 1552 wrote to memory of 1164 1552 ehrui.exe 21 PID 1552 wrote to memory of 1164 1552 ehrui.exe 21 PID 1552 wrote to memory of 1164 1552 ehrui.exe 21 PID 1552 wrote to memory of 1164 1552 ehrui.exe 21 PID 1552 wrote to memory of 1164 1552 ehrui.exe 21 PID 1552 wrote to memory of 1228 1552 ehrui.exe 25 PID 1552 wrote to memory of 1228 1552 ehrui.exe 25 PID 1552 wrote to memory of 1228 1552 ehrui.exe 25 PID 1552 wrote to memory of 1228 1552 ehrui.exe 25 PID 1552 wrote to memory of 1228 1552 ehrui.exe 25 PID 1552 wrote to memory of 1472 1552 ehrui.exe 29 PID 1552 wrote to memory of 1472 1552 ehrui.exe 29 PID 1552 wrote to memory of 1472 1552 ehrui.exe 29 PID 1552 wrote to memory of 1472 1552 ehrui.exe 29 PID 1552 wrote to memory of 1472 1552 ehrui.exe 29 PID 1472 wrote to memory of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31 PID 1472 wrote to memory of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31 PID 1472 wrote to memory of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31 PID 1472 wrote to memory of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31 PID 1472 wrote to memory of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31 PID 1472 wrote to memory of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31 PID 1472 wrote to memory of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31 PID 1472 wrote to memory of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31 PID 1472 wrote to memory of 1824 1472 5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1028
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1092
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f05977fa039dab76e94eae857888ef9_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Roaming\Anuhy\ehrui.exe"C:\Users\Admin\AppData\Roaming\Anuhy\ehrui.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpa21f4f51.bat"3⤵
- Deletes itself
PID:1824
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD595ce620100152db7b2aed212b96fd624
SHA19742c922fded65d16c51a4dfcd7b53503d7d7264
SHA2564bad5d42a19381a6bb79a578aa1c820325157d55eb12a98936244161d78e6e08
SHA51239819afe2fa7c1a1b2310e4aa5804403671cd7bef5f369ecb8b86918a744b73cdd90175845fb751bb1f6b3b01616259864f401a44b72dad7495d329a45d70a4a
-
Filesize
364KB
MD5bf58f47ba62389673c012d963a3b6d9a
SHA1725b53264e6b5e48cdb83aa34a09f5e949c69052
SHA25628b6e11c58384c66753ec2d26578ecc608d7ade4e8d82a986513d3bdcc2be779
SHA512a6f738a812536dc9f3d76109f210bbf74476ff3a2d62f86f94ffbc384e21324ed6b089c5f2a73981122c9198c9fbee81e188a033eacc6eab72bae7a2171dc058