Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe
-
Size
290KB
-
MD5
642ef37f7493e5695f20d8cf2574f705
-
SHA1
08fbd79b90d76126b535b36e7fefb4716c95c310
-
SHA256
ddc9637f1f74a8c1224e3ca2dd854e18154d3c74693fdaab9872a9bef3e60cdb
-
SHA512
505e8eb33230efcbfa3856d2429b9d589d9de3394ff7b42da03b9a110a6c5e13712ccd753de05ec2aac5c3bef0a983b6b8e9ba5a2d804824a75c202f33ae94ba
-
SSDEEP
6144:KfsVV09Du+Rc9DMQtc9LMojzmx1i68Nb/67pkkDvarYdYLx3IhpD:Os2C9DGh1wi6A/ephDvRY13QpD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2836 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 izjo.exe -
Loads dropped DLL 2 IoCs
pid Process 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\{4A4DE868-6E67-AD4F-A8F7-B67989399564} = "C:\\Users\\Admin\\AppData\\Roaming\\Gyinlu\\izjo.exe" izjo.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2576 set thread context of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Privacy 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe 2020 izjo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe Token: SeSecurityPrivilege 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe Token: SeSecurityPrivilege 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 2020 izjo.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2020 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 31 PID 2576 wrote to memory of 2020 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 31 PID 2576 wrote to memory of 2020 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 31 PID 2576 wrote to memory of 2020 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 31 PID 2020 wrote to memory of 1104 2020 izjo.exe 19 PID 2020 wrote to memory of 1104 2020 izjo.exe 19 PID 2020 wrote to memory of 1104 2020 izjo.exe 19 PID 2020 wrote to memory of 1104 2020 izjo.exe 19 PID 2020 wrote to memory of 1104 2020 izjo.exe 19 PID 2020 wrote to memory of 1168 2020 izjo.exe 20 PID 2020 wrote to memory of 1168 2020 izjo.exe 20 PID 2020 wrote to memory of 1168 2020 izjo.exe 20 PID 2020 wrote to memory of 1168 2020 izjo.exe 20 PID 2020 wrote to memory of 1168 2020 izjo.exe 20 PID 2020 wrote to memory of 1216 2020 izjo.exe 21 PID 2020 wrote to memory of 1216 2020 izjo.exe 21 PID 2020 wrote to memory of 1216 2020 izjo.exe 21 PID 2020 wrote to memory of 1216 2020 izjo.exe 21 PID 2020 wrote to memory of 1216 2020 izjo.exe 21 PID 2020 wrote to memory of 496 2020 izjo.exe 25 PID 2020 wrote to memory of 496 2020 izjo.exe 25 PID 2020 wrote to memory of 496 2020 izjo.exe 25 PID 2020 wrote to memory of 496 2020 izjo.exe 25 PID 2020 wrote to memory of 496 2020 izjo.exe 25 PID 2020 wrote to memory of 2576 2020 izjo.exe 30 PID 2020 wrote to memory of 2576 2020 izjo.exe 30 PID 2020 wrote to memory of 2576 2020 izjo.exe 30 PID 2020 wrote to memory of 2576 2020 izjo.exe 30 PID 2020 wrote to memory of 2576 2020 izjo.exe 30 PID 2576 wrote to memory of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32 PID 2576 wrote to memory of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32 PID 2576 wrote to memory of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32 PID 2576 wrote to memory of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32 PID 2576 wrote to memory of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32 PID 2576 wrote to memory of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32 PID 2576 wrote to memory of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32 PID 2576 wrote to memory of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32 PID 2576 wrote to memory of 2836 2576 642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe 32
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\642ef37f7493e5695f20d8cf2574f705_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\Gyinlu\izjo.exe"C:\Users\Admin\AppData\Roaming\Gyinlu\izjo.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp24e3125e.bat"3⤵
- Deletes itself
PID:2836
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD5cd913fc24889458d1d528a761b067ae5
SHA16f2265a9d54ea2f067b0b270d8bcf5cf894e4a84
SHA25672f587324e5e8c3ab43d2d70aa98f8528cbd1107354cb64567f5a56cb7524f80
SHA51202921ed0262d4792076cf43e85908a3227709c6f22037841ef2feb4e64bdb81125857f66537f5639a525bd5afb8629e604c3f01412f41324b52c9acffb3be397
-
Filesize
380B
MD5a66093435bc6ae9aacd6399a7dfe8780
SHA15fd967378925a7013a6ae2827669c27877201fa5
SHA256238c41d75ca18e70c3bcbc5f9ede9b3562433794a1ac4136ed1d79a235b4b060
SHA512621f398f63d7de72465a9d33a4eff0d4e31f4d3f797d1392485113188055d12b40bce01dd9e7296165ab9978dd06bac4c6e07a2fc7296ae219fe54f34ea35134
-
Filesize
290KB
MD50e45b9d3518da02561d02b1a7a0a97eb
SHA1e33894447fa9a4ef0613a6626893b79d0300db5f
SHA256b804fdee30227686002866946d13d96ed72b2adb914863dc34362721b326561f
SHA5120cbf542777087e567b5288281ce9462cd2c6b4c9f367a295bfb8f2e5805d53a26a72153e63edb3c33f1e00ef5b8c74b18d8a7c2d7a00b19975b2c7c927aab6f7