Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
22s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe
-
Size
491KB
-
MD5
611efffea1d58b68a3967e98b8c70e83
-
SHA1
fc337463b6b2da9b61b1dc3a068de038cd6b37e9
-
SHA256
1a13d16848e43115530eb8ab59d019ad1f640ed4a84f665296e2611bfe3eb1c8
-
SHA512
bd7bdd62b075000014be03ead5733f9655afc4799021d294b2743344d49133f24be909f94fca2885ee33b0e158c56487305f34f378bbd09e0c1cfb88f0837be0
-
SSDEEP
12288:TBqMD6NTVD/7Ftyq1zH6NZU1D8fBbQji4+8E:1qMD6NNzdzH68ufty+8E
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2720 MSB.exe 2888 tmp.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Wine MSB.exe -
Loads dropped DLL 6 IoCs
pid Process 2468 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 2468 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 2720 MSB.exe 2720 MSB.exe 2720 MSB.exe 2888 tmp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 tmp.exe 2888 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 MSB.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2720 2468 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2720 2468 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2720 2468 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2720 2468 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2720 2468 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2720 2468 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 29 PID 2468 wrote to memory of 2720 2468 611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe 29 PID 2720 wrote to memory of 2888 2720 MSB.exe 30 PID 2720 wrote to memory of 2888 2720 MSB.exe 30 PID 2720 wrote to memory of 2888 2720 MSB.exe 30 PID 2720 wrote to memory of 2888 2720 MSB.exe 30 PID 2720 wrote to memory of 2888 2720 MSB.exe 30 PID 2720 wrote to memory of 2888 2720 MSB.exe 30 PID 2720 wrote to memory of 2888 2720 MSB.exe 30 PID 2888 wrote to memory of 1252 2888 tmp.exe 20 PID 2888 wrote to memory of 1252 2888 tmp.exe 20 PID 2888 wrote to memory of 1252 2888 tmp.exe 20 PID 2888 wrote to memory of 1252 2888 tmp.exe 20 PID 2888 wrote to memory of 1252 2888 tmp.exe 20 PID 2888 wrote to memory of 1252 2888 tmp.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\611efffea1d58b68a3967e98b8c70e83_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSB.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSB.exe3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD53a4f1ca2300e01c33c86e898cf95b1cb
SHA19762eccb2176d86aaa8b2b3cb6d10ab44862f2b3
SHA25613627e7ecdf6f2cd98299e80290d142b0bcca2fdb31d457944ee63e47f4e2d4f
SHA512e7bbb2c267d5cf6778d57c44cbff33b42c26316c489db1a9055024b55e69f373e0c271f6c39dc193ec4b43094d7109c89b61a08b9ab71566c6feeb78d4645405
-
Filesize
49KB
MD590844b94b6fffe1d9b3de90697a876dc
SHA1146a6821b0e3105cd2245c496a9eb34f44a7471d
SHA256100a7049f39b8b47cabeb1b2257d0f50de17df208d2c5e860250405a98add7f5
SHA512f4bf5e82731867e4786bdc947d8926f748c1cb496cf06b6a7f936929480e3f89ea274c105ffbf8a4e92861e3db5cab11d48696e95452866469066ca76b497507