Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe
-
Size
165KB
-
MD5
63ab5461f5c9f1c5ca36e6cf9e9dd680
-
SHA1
00ae86ef1c6d69b63b4432ab9fd249202c57099e
-
SHA256
3b23ad50000234bf5c42790f27cafacdcf1eda51c4b58b055cd9150d10b918de
-
SHA512
64087b075d1721f48388ac2c6dd349f0b2ad3071e5642dc705f16df168cefd990505ce640baeef4bc28e08ef8a49130aad31fb52941efa0584b9880290842c86
-
SSDEEP
3072:UmIosdOXnhB5+Q5wgAlVtrS8Z8cz2XUfe3tV0RS2N0Sg7ovQ/hD+CSwvTbkRiG:U9e3hmQ58Mne2XUfvbCxoIJQcTww
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2120-1-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2376-5-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2376-4-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2376-7-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2120-14-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/1152-76-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2120-77-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2120-167-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\conhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\conhost.exe" 63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2376 2120 63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2376 2120 63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2376 2120 63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe 31 PID 2120 wrote to memory of 2376 2120 63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1152 2120 63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe 33 PID 2120 wrote to memory of 1152 2120 63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe 33 PID 2120 wrote to memory of 1152 2120 63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe 33 PID 2120 wrote to memory of 1152 2120 63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming2⤵PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp2⤵PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5255a86e10d8af2143fde64538d199b71
SHA11bff7b7dfa8d41420d23d4df54c0d0adea2b3332
SHA256ed07f99c54b0021b1431a1e409d78ff1391bc2bb14eb970581b2c5b55ba2e81d
SHA5129f6a5316cf8284c684e6790ce8bcd3baf757063833aa52423f7b3851d76c456cef981f32dd322799a8dbd56db22263d7f4b2eddecbbde7290689c62aaa1f72be
-
Filesize
600B
MD58cfebfb3f702f1c38216e7ad84a341cc
SHA1d88c7105750c2b67143bd6e0123e5456b5285df0
SHA2566396933f9c662bc01fada2e1e785f0cd68b2235f13df5f2756079ce6b6beaecf
SHA512ef2cba0333a02eb7a1de0ca11f568398d60cbbb3b88a6b0cb909a5d26fd2002b134c92a470940818f58c7f2f2481d9f62d35a9b98a9e043abb351c9d9a6ddf84
-
Filesize
996B
MD5e166c7ab4ab421cadabf52537764729f
SHA146dacbb5d2713d88277c955ad7c4d4e2c1553e23
SHA256fa6733fbd858d985b401b988238251fc89d55efaf508ea12a0463be6c143bd13
SHA51238989e3968b3b95533d8dc57639627ef0c5568f317eb2b59321895fb9f534fb0c4b7ec1d8ddfbe39e46e43b01ef0779b865660ccd0d11ab3bd52bfc34e6ff52a