Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe
-
Size
51KB
-
MD5
62ea64dbbee072e49bfa0becfb92c18d
-
SHA1
7c061d9d546073c3937c437eff6812f1e9920ea3
-
SHA256
3656d4ff1eb0e21419d94591d24fc5e460acd2e201b30ac40495ac7180ef4c5c
-
SHA512
e0b0d728f3bcbf1b56e6e4d1190286ad35c250e8d9e9f463c41a59c8ce4ca264a0ccc98c6d63d06c487d596d73110118018cbab40c2a3c006e5039249130e044
-
SSDEEP
768:7tPFqOzt2NK4HKhq/DTXMMjxykj0o9DX8B5pW2n:7tPFNzOqk/DTMMNyhop0J
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2748 tmps.exe 2620 tmps.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center = "tmps.exe" 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2068 set thread context of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 2748 set thread context of 2620 2748 tmps.exe 34 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\tmps.exe 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe File created C:\Windows\tmps.exe 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 2748 tmps.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 2068 wrote to memory of 1624 2068 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 31 PID 1624 wrote to memory of 2748 1624 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 33 PID 1624 wrote to memory of 2748 1624 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 33 PID 1624 wrote to memory of 2748 1624 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 33 PID 1624 wrote to memory of 2748 1624 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 33 PID 2748 wrote to memory of 2620 2748 tmps.exe 34 PID 2748 wrote to memory of 2620 2748 tmps.exe 34 PID 2748 wrote to memory of 2620 2748 tmps.exe 34 PID 2748 wrote to memory of 2620 2748 tmps.exe 34 PID 2748 wrote to memory of 2620 2748 tmps.exe 34 PID 2748 wrote to memory of 2620 2748 tmps.exe 34 PID 2748 wrote to memory of 2620 2748 tmps.exe 34 PID 2748 wrote to memory of 2620 2748 tmps.exe 34 PID 2748 wrote to memory of 2620 2748 tmps.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\tmps.exe"C:\Windows\tmps.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\tmps.exe"C:\Windows\tmps.exe"4⤵
- Executes dropped EXE
PID:2620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD562ea64dbbee072e49bfa0becfb92c18d
SHA17c061d9d546073c3937c437eff6812f1e9920ea3
SHA2563656d4ff1eb0e21419d94591d24fc5e460acd2e201b30ac40495ac7180ef4c5c
SHA512e0b0d728f3bcbf1b56e6e4d1190286ad35c250e8d9e9f463c41a59c8ce4ca264a0ccc98c6d63d06c487d596d73110118018cbab40c2a3c006e5039249130e044