Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe
-
Size
282KB
-
MD5
611a201b2c055dca0d15916bd60b6ab1
-
SHA1
b665fa95b797e91ccc8bdd1e2228fc5112cb27c3
-
SHA256
69ef9064f92006a1beafec2f55f1f686dd9dafe4864ec8c5279384d78977086e
-
SHA512
5c335d5855b3b3ba07d6e791be9d61dfbbcd8f719ac1cc614a5d914cca94dc2cf70fed07aff87726e9c33231529611b6b6a80ea21269c636a57fc3c3b61561ed
-
SSDEEP
6144:ZLwSv3A6hlVbPG9usjTSKoXVOdgFyVbi2HtoQzb1pBVUjWO:ZMSY8lNPYHw85qWbUj3
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0008000000018ba5-2.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1508 ckrdyr.exe -
Loads dropped DLL 3 IoCs
pid Process 2928 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe 2928 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe 2928 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe -
resource yara_rule behavioral1/files/0x0008000000018ba5-2.dat upx behavioral1/memory/2928-7-0x0000000075120000-0x0000000075144000-memory.dmp upx behavioral1/memory/2928-19-0x0000000075120000-0x0000000075144000-memory.dmp upx behavioral1/memory/2928-20-0x0000000075120000-0x0000000075144000-memory.dmp upx behavioral1/memory/2928-21-0x0000000075120000-0x0000000075144000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xitdpit 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe File opened for modification C:\Windows\xitdpit 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1508 2928 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe 31 PID 2928 wrote to memory of 1508 2928 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe 31 PID 2928 wrote to memory of 1508 2928 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe 31 PID 2928 wrote to memory of 1508 2928 611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\ckrdyr.exe"C:\Users\Admin\AppData\Local\Temp\ckrdyr.exe"2⤵
- Executes dropped EXE
PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5d36d8859f9b974d49d4b837d373d1674
SHA1b7e995a5e809b8beca970b189c460b66f3d99935
SHA25645d0873050b62c11da8c090b835bc47edcdb35f50de40fa0c2387e1c1c4fcdad
SHA51296a955d825fa175b10ba3d8e4bbc56252f8ec40d287b73b11fb2f2217d0866b3214e81ae6fc2db110799a352ed033fa5c38b8dfa92d5c1658b67ed070008c9ae
-
Filesize
51KB
MD591a804e7b75d591f33cd58bf28c23f20
SHA1182b6847f12f7193552bf05392b193643e21d085
SHA256346aca2c18c86babaea64d15684bfac4ba601654dbc07cd9aac9e3e311024276
SHA512062b6e4fbfcf51f6731537132a25f3a370260d6d6aedbba9f7d9271dfde63533e71ebdd9f5042170796fb491c40cfae543fe488f5b338b0be3669a747eb76cc4