Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe
-
Size
112KB
-
MD5
6942c25e20fe4e18e7545ac2137f409a
-
SHA1
ae1ce8e5808b6919582423c8408692607e0c0902
-
SHA256
54f2697220200b334a42b5800f841002629d78dab13ee49f2f6577847d0e276b
-
SHA512
9004bf525104e7221bc1aca7eb76144a0ce679a35e885f8e1391fda5bc1bf723facba91e87e4e75476286440f8cbe9fef0d5304acbb4fffe09065392a551dedf
-
SSDEEP
3072:MstjE+tiz2zy6YzVi6zz0/Q9qBnkn4wX42T0:6+wAy68V5WrRRMnY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 480 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2840 ambi.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\{B7D3CCA4-D369-426D-85D9-5544A3EA017F} = "C:\\Users\\Admin\\AppData\\Roaming\\Erbud\\ambi.exe" ambi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ambi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe 2840 ambi.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe Token: SeSecurityPrivilege 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe Token: SeSecurityPrivilege 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 2840 ambi.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2840 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2840 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2840 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 30 PID 2228 wrote to memory of 2840 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1104 2840 ambi.exe 19 PID 2840 wrote to memory of 1104 2840 ambi.exe 19 PID 2840 wrote to memory of 1104 2840 ambi.exe 19 PID 2840 wrote to memory of 1104 2840 ambi.exe 19 PID 2840 wrote to memory of 1104 2840 ambi.exe 19 PID 2840 wrote to memory of 1152 2840 ambi.exe 20 PID 2840 wrote to memory of 1152 2840 ambi.exe 20 PID 2840 wrote to memory of 1152 2840 ambi.exe 20 PID 2840 wrote to memory of 1152 2840 ambi.exe 20 PID 2840 wrote to memory of 1152 2840 ambi.exe 20 PID 2840 wrote to memory of 1200 2840 ambi.exe 21 PID 2840 wrote to memory of 1200 2840 ambi.exe 21 PID 2840 wrote to memory of 1200 2840 ambi.exe 21 PID 2840 wrote to memory of 1200 2840 ambi.exe 21 PID 2840 wrote to memory of 1200 2840 ambi.exe 21 PID 2840 wrote to memory of 1248 2840 ambi.exe 25 PID 2840 wrote to memory of 1248 2840 ambi.exe 25 PID 2840 wrote to memory of 1248 2840 ambi.exe 25 PID 2840 wrote to memory of 1248 2840 ambi.exe 25 PID 2840 wrote to memory of 1248 2840 ambi.exe 25 PID 2840 wrote to memory of 2228 2840 ambi.exe 29 PID 2840 wrote to memory of 2228 2840 ambi.exe 29 PID 2840 wrote to memory of 2228 2840 ambi.exe 29 PID 2840 wrote to memory of 2228 2840 ambi.exe 29 PID 2840 wrote to memory of 2228 2840 ambi.exe 29 PID 2228 wrote to memory of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 PID 2228 wrote to memory of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 PID 2228 wrote to memory of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 PID 2228 wrote to memory of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 PID 2228 wrote to memory of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 PID 2228 wrote to memory of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 PID 2228 wrote to memory of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 PID 2228 wrote to memory of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 PID 2228 wrote to memory of 480 2228 6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe 31 PID 2840 wrote to memory of 660 2840 ambi.exe 33 PID 2840 wrote to memory of 660 2840 ambi.exe 33 PID 2840 wrote to memory of 660 2840 ambi.exe 33 PID 2840 wrote to memory of 660 2840 ambi.exe 33 PID 2840 wrote to memory of 660 2840 ambi.exe 33 PID 2840 wrote to memory of 1744 2840 ambi.exe 35 PID 2840 wrote to memory of 1744 2840 ambi.exe 35 PID 2840 wrote to memory of 1744 2840 ambi.exe 35 PID 2840 wrote to memory of 1744 2840 ambi.exe 35 PID 2840 wrote to memory of 1744 2840 ambi.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6942c25e20fe4e18e7545ac2137f409a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\Erbud\ambi.exe"C:\Users\Admin\AppData\Roaming\Erbud\ambi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpe8debc87.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:480
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1248
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:660
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
271B
MD55d70388b21b39a72ad455a3a347a6f94
SHA161e99af6a77f32d6451d11df1148cd57f15fbce1
SHA256453d90835965baa9900d9f6172911c9e6ccf574359f27bee0deb97e319df3e86
SHA51229a3474b8f82258b6b2c08d255dcc3007fe16247fbf9c07ee5439b3620f95b7e8428b17d5a15f37fb0494a7a3d6850c11e6b0fc63ba6baab2ab26d1c49724b6b
-
Filesize
380B
MD58efbe6c5ab0af95fa4dffaa02d0cee65
SHA12c3ef1f629e4234709e6b6da163fa8402c95241d
SHA256213624e87b8bb1d5f5a21aed541e6dcd01cf25559ca8a3b4498e46d4cedde1d6
SHA512dd789fc682d001740261eef0eefdb96397a3b11fe217fa9e8f197dd33bc63f030c079702ff001a444f6e46e4e32b95f3f06475441b983914a29af4c6c9936e03
-
Filesize
112KB
MD5f300949ee9b894d4a47289ecafc6b173
SHA1daba056b6409f7348875a827d40cc83d0a9753b3
SHA2569161d337ef4ecb365d05aa2dece975b43a2b09feb9c455ffd2757618b30a5101
SHA512fbb6c74c19a25446fd6b5bc4bc6d03da9768b592cb3a26e908c6ce8c4ed89a1166339f999e220bd80646bbc5d0054ddf1770b3d395a6443d3915107f23071548